Book Details


Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


Cloud Computing is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network. The IT services of Cloud Computing are delivered by third party provider who owns the infrastructure. Benefits of cloud storage are easy access means access to your knowledge anyplace, anyhow, anytime, scalability, resilience, cost efficiency and high reliability of the data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. To secure the Cloud means secure the treatments (calculations) and storage (databases hosted by the Cloud provider). In this research paper, the proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.


[1] Sandipan Basu, International Data Encryption Algorithm (IDEA) A Typical Illustration?, Journal of Global Research in Computer Science. July (2011) ISSN: 2229-371XVol. 2,

[2] Alexa Huth and James Cebula „The Basics of Cloud Computing?, United States Computer Emergency Readiness Team (2011).

[3]Simar Preet Singh and Gurpinder Singh amra, „Managing Vulnerabilities? in Cloud Computing?, National Conference on Engineering applications? (NCEA-2011), St. Solider Institute of Emerging Technology and Management, alandhar, Punjab. April 9 (2011).

[4] I-Hsun Chuang, Syuan-Hao Li, Kuan-Chieh Huang, Yau-Hwang Kuo,” An Effective privacy protection scheme for cloud computing”,IEEE 2011.

[5] Jianfeng Yang and Zhibin Chen,” Cloud Computing Research and Security Issues”, IEEE 2010. Sunita Rani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies,

[6] V. Sandhya, “A Study on Various Security Methods in Cloud Computing”, International Journal of Advanced Research in Computer Science, Volume 2, No.6, Nov-Dec 2011.

[7]. Simarjeet Kaur, “Cryptography and Encryption in Cloud Computing”, VSRD International Journal of Computer Science and Information Technology, Vol.2(3), 242-249, 2012.

[8] Birendra Goswani, Dr.S.N.Singh, “Enhancing Security in Cloud computing using Public Key Cryptography with Matrices”, International Journal of Engineering Research and Applications, Vol 2, Issue 4, 339-344, July-Aug 2012.


Cloud Computing, Cryptographic Algorithm, Infrastructure, Internet, Security Issue.

  • Format Volume 5, Issue 1, No 12, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author M.Saranya, Dr.T.Ramaprabha
  • Reference IJCS-212
  • Page No 1321-1328

Copyright 2022 SK Research Group of Companies. All Rights Reserved.