• Corpus ID: 17745402

Cryptographic Techniques , Threats and Privacy Challenges in Cloud Computing

  title={Cryptographic Techniques , Threats and Privacy Challenges in Cloud Computing},
  author={Jissy Ann George and Dr. M. Hemalatha},
Cryptography is essential for the security and integrity of the data that is stored in the cloud. Several cryptographic techniques are used to protect the integrity of data for various applications. A particular security method makes use of different cryptographic techniques to encrypt data and make it into an un-readable form, which can then be decrypted only with the help of a key. A number of cryptographic techniques are available for use in protection of data in various applications… 
1 Citations

Tables from this paper

Review of Symmetric Cryptographic Ciphers
This paper has given a summarized form of all the reviews done on symmetric key cryptographic algorithms along with their advantages and disadvantages and proposed a solution that helps to overcome the disadvantage of the AES cryptographic algorithm.


Designing of Cryptography Based Security System for Cloud Computing
  • N. Sengupta, J. Holmes
  • Computer Science
    2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies
  • 2013
Efficient hybrid cryptography system, Hybrid Vigenere Caesar Cipher Encryption (HVCCE) is proposed which will prevent the cloud infrastructure in three main places, in client location, in the network and in server.
Randomness testing of modern encryption techniques in cloud environment
This evaluation uses Pseudo Random Number Generator (PRNG) to determine the most suitable technique and analysis the performance of selected modern encryption techniques and Simulation results are shown to demonstrate the effectiveness of each algorithm.
Cloud Computing Security--Trends and Research Directions
A holistic view of cloud computing security - spanning across the possible issues and vulnerabilities connected with virtualization infrastructure, software platform, identity management and access control, data integrity, confidentiality and privacy, physical and process security aspects, and legal compliance in cloud is taken.
Cryptography Challenges for Computational Privacyin Public Clouds
  • Sashank Dara
  • Computer Science, Mathematics
    2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)
  • 2013
The challenges with current cryptographic techniques being pursued by researchers are discussed and it is shown that they dont cater to blanket cover these privacy requirements for Cloud offerings in various delivery methods.
Enhancing Cloud Computing Security using AES Algorithm
A simple data protection model is proposed where data is encrypted using Advanced Encryption Standard (AES) before it is launched in the cloud, thus ensuring data confidentiality and security.
Classification of Security Issues and Solutions in Cloud Environments
Different security issues into the different levels that exist in cloud environments are classified and different solutions to the security issues in the cloud are presented according to the type of security they provide with.
Security Concerns in Cloud Computing
This work provides comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats, and provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.
Comparative study of attribute based encryption techniques in cloud computing
Multi authority hierarchical attribute based encryption is proposed and it is compared with key policy and cipher text policy attribute basedryption techniques and based on NIST statistical test highest security attributebased encryption algorithm is selected in cloud.
A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing
This article identifies and classify the main security concerns and solutions in cloud computing, and proposes a taxonomy of security in cloud Computing, giving an overview of the current status ofSecurity in this emerging technology.
Fully homomorphic encryption equating to cloud security: An approach
A new method, called fully homomorphic encryption (FHE) that performs computation with the encrypted data and send to the client and offers a realistic hope that such calculations can be performed securely in the cloud.