A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using KIST Algorithm
Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 10)Publication Date: 2016-01-01
Authors : Vasant Namdeo Dhatrak.; Jeevan Rameshchandra Heda; Adesh Vasant Bhabad.; Gaurav Prasad Shahane.; Bajirao Subhash Shirole.;
Page : 766-768
Keywords : Cloud storage; Security; Confidentiality; Cryptography; KIST Algorithm; Encryption; Decryption; Fraud Detection;
Abstract
Now days rapidly increased use of cloud computing in the many organization and IT industries and provides latest software solution with minimum cost. So the cloud computing give us number of benefits with minimum cost and of data accessibility through Internet. The ensuring security risks of the cloud computing is the main factor in the cloud computing environment, The evolving essence is Cloud computing, that is beneficial in cost effective parts, such as capability inflexible computing, decreasing the time period to market and insufficient computing power. By using the complete ability of cloud computing, data are transmitted, processed and stored on the outside cloud service providers. The fact is that, the owner of the data is feeling extremely unconfident to locate their data outer to their own control. Security and Confidentiality of data stored in the cloud are key setbacks in the area of Cloud Computing. Security and Confidentiality are the key issues for cloud storage. This paper proposes a KIST encryption algorithm to concentrate on the security and Confidentiality issues in cloud storage and also compressed cipher text data in order to protect the data stored in the cloud.
Other Latest Articles
- Design & Analysis of High rise Building With & Without Floating Column Using Etabs
- Study on Effect of Wind Load and Earthquake Load on Multi-storey RC Framed Buildings
- Implementation and Validation of Supplier Selection Model for Shaper Machine Arm by Fuzzy Inference Decision Support System
- A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimensional Data Using Randomized and SVD Algorithm
- A survey on Design and Implementation of Clever Crawler Based On DUST Removal
Last modified: 2016-01-09 20:24:24