Applying Encryption Algorithm for Data Security in Cloud Storage

  • Zaid KartitEmail author
  • Ali Azougaghe
  • H. Kamal Idrissi
  • M. El Marraki
  • M. Hedabou
  • M. Belkasmi
  • A. Kartit
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 366)


This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.


Cloud storage Data security Cryptography RSA AES 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kolodner, E.K., Tal, S., Kyriazis, D., et al.: A cloud environment for data-intensive storage services. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), pp. 357–366. IEEE (2011)Google Scholar
  2. 2.
    Arora, P., Wadhawan, R.C., Ahuja, E.S.P.: Cloud Computing Security Issues in Infrastructure as a Service. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(1) (2012)Google Scholar
  3. 3.
    Kumar, M.D.K., Rao, G.V., Rao, G.S.: Cloud Computing: An Analysis of Its Challenges & Cloud Computing: An Analysis of Its Challenges & Security IssuesGoogle Scholar
  4. 4.
    Mehta, N., Gupta, V. K.: A survey on use of SaaS of cloud in education. In: International Conference on Cloud, Big Data and Trust (2013)Google Scholar
  5. 5.
    Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: 39th International Conference on Parallel Processing Workshops (2010)Google Scholar
  6. 6.
    Bezemer, C.-P., Zaidman, A., Platzbeecker, B., et al.: Enabling multi-tenancy: an industrial experience report. In: 2010 IEEE International Conference on Software Maintenance (ICSM), pp. 1–8. IEEE (2010)Google Scholar
  7. 7.
    Kamal Idrissi, H., Kartit, A., El Marraki, M.: Foremost security apprehensions in cloud computing. Journal of Theoretical and Applied Information Technology 59(3), January 31, 2014Google Scholar
  8. 8.
    Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN) 3(5) (2011)Google Scholar
  9. 9.
    Gong, C., Liu, J., Zhang, Q., Chen, H., Gongng, H.: The characteristics of cloud computing. In: 2010 39th International Conference on Parallel Processing Workshopse Brazilian Computer Society (2010)Google Scholar
  10. 10.
    A Platform Computing Whitepaper. Enterprise Cloud Computing: Transforming IT. Platform Computing, p. 6 (2010)Google Scholar
  11. 11.
    Arockiam, L., Monikandan, S.: Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm. International Journal of Advanced Research in Computer and Communication Engineering 2(8), August 2013Google Scholar
  12. 12.
  13. 13.
    Wang, C., Wang, Q., Ren, K.: Ensuring Data Storage Security in Cloud Computing. IEEE (2009). 978-1-4244-3876-1Google Scholar
  14. 14.
    Liu, Q., Wang, G., Wu, J.: Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications 35(3), 927–933 (2012)CrossRefGoogle Scholar
  15. 15.
    Nagendra, M., Sekhar, M.C.: Performance Improvement of Advanced Encryption Algorithm using Parallel Imputation. International Journal of Software Engineering and Its Applications 8(2), 287–296 (2014)Google Scholar
  16. 16.
    Zhang, X., Wu, N., Yan, G., et al.: Hardware Implementation of Compact AES S-box. IAENG International Journal of Computer Science 42(2) (2015)Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2016

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (, which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  • Zaid Kartit
    • 1
    Email author
  • Ali Azougaghe
    • 2
  • H. Kamal Idrissi
    • 1
  • M. El Marraki
    • 1
  • M. Hedabou
    • 3
  • M. Belkasmi
    • 2
  • A. Kartit
    • 4
  1. 1.LRIT, Faculty of SciencesMohammed V UniversityRabatMorocco
  2. 2.SIMEMohammed V University, ENSIASRabatMorocco
  3. 3.ENSA de SafiUniversity of Cadi AyyadMarrakechMorocco
  4. 4.LTIUniversity Chouaib Doukkali, ENSAEl JadidaMorocco

Personalised recommendations