International Journal of Advanced
Science and Engineering Research
For Queries/Clarification
alameenpublications@gmail.com
e-ISSN 2455-9288
Why publish with
ijaser
IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.
ENHANCING DATA SECURITY AND AUTHENTICATION IN CLOUD COMPUTING USING ADVANCED ENCRYPTION STANDARD AND DIGITAL SIGNATURE
Abstract
Abstract: Cloud computing may be a large growing technology within the IT industries. Cloud Service
Providers (CSP) are measure providing numerous suitable and flexible services to the users. Users of cloud
computing are growing in in an equal rhyme. As cloud computing is turning into essential a part of human
life, users and CSP are measure noticing for appropriate security feathers. Several researchers are measure
operating within the security aspects of cloud computing. A tendency to gift an acceptable cryptography and
secure authentication system for cloud computing. This procedure includes auto encryption and KEYs
dynamical process within the cloud end. New generated KEYs won't be sent to users at the start. Users are
checked in 3 steps for authentication. CSP will trigger encryption method at any time manually or it will be
performed automatically when logged out by the users. This procedure can guarantee additional security for
data/files as well as prevent hackers from obtaining original files/data even they got valid credential.
Proposed protocol is simulated by CloudSim and we observed that an additional step wants for user’s
credential, it needed a bit of time to use data/files for less than the first time. This bit of time is negligible
and that we will exclude it from thought however security increase more and more. Different encryption
techniques attempt to overcome these data security problems to a good extent. Advanced Encryption
Standard (AES) is a commonly used symmetric key encryption algorithm used for encrypting the data to be
keep within the cloud. Another downside that features a distinguished role whereas handling cloud
knowledge is authentication. Digital signatures are used for confirmatory the authentication of the document
send by the sender for sharing with the recipients
Author
Mr. D. Seenivasan a
, Ms. Seethaa Periyasamy AYP b