ENCRYPTION SECURITY SHARING DATA CLOUD COMPUTING BY USING AES ALGORITHM: A SYSTEMATIC REVIEW

TEKNOKOM ◽  
2019 ◽  
Vol 2 (2) ◽  
pp. 11-16
Author(s):  
Taufik Hidayat

Technology cloud computing is the revolution can share resources, services and data between users through a network of. Because millions of users use the same rights on the network to transfer data, and data to a vulnerable to attack security of the do not have the right of access or an intruder. System for security of data now concentrate on the provision of security the internet in data storage, cloud but little regard on security data while data transfer consider security as a very influential, the proposed concentrate on providing security to transfer data using a technique encryption. Research conducted show that the approach proposed boost security whole system make an intruder difficult to take the data in the transfer. To prevent it proposes encryption writer methods in cloud computing with algorithm AES (Advanced Encryption Standard) the process of security in the process of data transfers and data storage. The method is in search of the research uses systematic review, because method SLR able to give suggestions and opportunities for research on the future.

Author(s):  
Taufik Hidayat ◽  
Rahutomo Mahardiko

Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.


TEKNOKOM ◽  
2019 ◽  
Vol 2 (2) ◽  
pp. 11-16
Author(s):  
Taufik Hidayat

Teknologi cloud computing merupakan revolusi yang dapat berbagi sumber daya, layanan dan data di antara pengguna melalui jaringan. Karena jutaan pengguna menggunakan hak yang sama pada jaringan untuk mentransfer data, maka data menjadi lebih rentan terhadap serangan keamanan dari pihak yang tidak memiliki hak akses atau penyusup. Sistem untuk keamanan data sekarang berkonsentrasi pada penyediaan keamanan internet dalam penyimpanan data cloud, tetapi kurang memperhatikan terhadap keamanan data saat sedang melakukan transfer data. Mempertimbangkan keamanan sebagai masalah yang sangat berpengaruh, sistem yang diusulkan berkonsentrasi pada penyediaan keamanan untuk mentransfer data menggunakan teknik enkripsi. Penelitian yang dilakukan menunjukkan bahwa pendekatan yang diusulkan meningkatkan keamanan sistem secara keseluruhan membuat penyusup sulit untuk mengambil data yang di transfer. Untuk mencegah itu semua penulis mengusulkan metode enkripsi pada cloud computingdengan menggunakan algoritma AES (Advanced Encryption Standard) yang dapat melakukan proses pengamanan dalam proses transfer data maupun penyimpanan data. Metode yang dilakukan dalam mencari usulan penelitian menggunakan sistematika review, karena metode SLR mampu berikan usulan dan peluang bagi penelitian pada masa mendatang.


2020 ◽  
Vol 3 (2) ◽  
pp. 21-30
Author(s):  
Jitendra Kumar ◽  
Mohammed Ammar ◽  
Shah Abhay Kantilal ◽  
Vaishali R. Thakare

Cloud is a collective term for a large number of developments and possibilities. Various data can be stored by the large amount of people onto the cloud storage facility without any bound of limitations as it provides tremendous space. Open systems like Android (Google Apps) still face many day- to-day security threats or attacks. With recent demand, cloud computing has raised security concerns for both service providers and consumers. Major issues like data transfer over wireless network across the globe have to be protected from unauthorized usage over the cloud as altered data can lead to great loss. In this regard, data auditing along with integrity, dynamic capabilities, and privacy preserving, and plays as an important role for preventing data from various cloud attacks which is considered in this work. The work also includes efficient auditor which plays a crucial role in securing the cloud environment. This paper presents a review on the cloud computing concepts and security issues inherent within the context of cloud computing and cloud infrastructure.


IJARCCE ◽  
2017 ◽  
Vol 6 (3) ◽  
pp. 752-755 ◽  
Author(s):  
Vasant S. Kakade ◽  
Akshay Kirve ◽  
Ankush Bhoir ◽  
Sagar Kadam

2021 ◽  
Vol 33 (6) ◽  
pp. 0-0

In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.


Author(s):  
Raveendra Gudodagi ◽  
R. Venkata Siva Reddy

Compression of genomic data has gained enormous momentum in recent years because of advances in technology, exponentially growing health concerns, and government funding for research. Such advances have driven us to personalize public health and medical care. These pose a considerable challenge for ubiquitous computing in data storage. One of the main issues faced by genomic laboratories is the 'cost of storage' due to the large data file of the human genome (ranging from 30 GB to 200 GB). Data preservation is a set of actions meant to protect data from unauthorized access or changes. There are several methods used to protect data, and encryption is one of them. Protecting genomic data is a critical concern in genomics as it includes personal data. We suggest a secure encryption and decryption technique for diverse genomic data (FASTA / FASTQ format) in this article. Since we know the sequenced data is massive in bulk, the raw sequenced file is broken into sections and compressed. The Advanced Encryption Standard (AES) algorithm is used for encryption, and the Galois / Counter Mode (GCM) algorithm, is used to decode the encrypted data. This approach reduces the amount of storage space used for the data disc while preserving the data. This condition necessitates the use of a modern data compression strategy. That not only reduces storage but also improves process efficiency by using a k-th order Markov chain. In this regard, no efforts have been made to address this problem separately, from both the hardware and software realms. In this analysis, we support the need for a tailor-made hardware and software ecosystem that will take full advantage of the current stand-alone solutions. The paper discusses sequenced DNA, which may take the form of raw data obtained from sequencing. Inappropriate use of genomic data presents unique risks because it can be used to classify any individual; thus, the study focuses on the security provisioning and compression of diverse genomic data using the Advanced Encryption Standard (AES) Algorithm.


Author(s):  
Arsha Kolate, Et. al.

Securing information is the most important need of not only the business world but also it’s highly essential in all the other major sectors. The secured data storage capacity along with security during data transit is also an important factor. In this paper DNA based security technique is proposed as an information carrier, the new data securing method can be adopted by harnessing the advantages of DNA based AES. This technique will provide multilayer security. The proposed system aims to secure transactional data during communication as it is required when message or data transfer between sender and receiver should be confidential along with integrity and availability.AS the data hiding needs a carrier to hold the data, therefore in order to enhance data security and make the data more confidential effective encryption algorithm is proposed using DNA cryptography. DNA molecules, holds an ability to store, process and transfer data, stimulates the notion of DNA cryptography. This amalgamation of the chemical features of genetic DNA structures along with cryptography confirms the non-vulnerable communication. The current features with reference to DNA cryptography are reviewed and presented here.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Virdyra Tasril

The development of computer and telecommunications technology has experienced the significant change inprogress. It can be seen that technology has become a necessity because technological advances can accomplishtasks quickly, accurately, and efficiently. In line with the development of these technologies, it increasinglychanges the way people communicate. There needs to be security protection to protect data from the threat ofwild parties. Cryptography is the right method to secure data. One method that can be used is the AdvancedEncryption Standard (AES). This method is an excellent classical cryptographic algorithm that can be used toidentify data. AES algorithm is a symmetric ciphertext block that can encrypt and decrypt information quickly.Encryption changes data that can no longer be read called ciphertext; instead, decryption is changing theciphertext data into the original form that we know as plaintext. The AES algorithm has several key modelssuch as 128, 192, and 256 bits to encrypt and decrypt data on 128-bit message blocks. This study uses a 128-bitkey. AES encryption results can be trusted as one of the fast and powerful encryption methods.


2021 ◽  
Vol 1 (02) ◽  
pp. 13
Author(s):  
Bagus Satrio Waluyo Poetro ◽  
Sam Farisa Chaerul Haviana ◽  
Arief Budiman

One way to measure the success of the academic process and achievement of student competence, is giving exams, from the smallest level namely daily tests, semester exams, to the highest level, namely the national exam. In an effort to maintain the security of exam question data, there is a data security method known as cryptography. In this research, a security system was designed that serves to protect exam questions so that data cannot be read by student before its time by using the Advanced Encryption Standard (AES) algorithm.  The AES algorithm is a type of symmetric algorithm where the encryption and decryption processes have the same key for the encryption and decryption processes. In the system that will be designed, the Caesar Cipher algorithm is used to form an additional key (seed) that is kept secret from the public. The results of this study indicate that AES encryption method can give results maximum so that the AES method can applied to virtual data storage system to protect the transmitted data.


Sign in / Sign up

Export Citation Format

Share Document