Improved Technique for Data Confidentiality in Cloud Environment

  • Pratyush RanjanEmail author
  • Preeti Mishra
  • Jaiveer Singh Rawat
  • Emmanuel S. Pilli
  • R. C. Joshi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 284)


Cloud Computing allows anyone to provision virtual hardware, runtime environment and services. Resources can be accessed over the Internet and offered on pay-per-use basis by cloud computing service providers (CSPs). Data storage is one of the services of cloud computing. Data Security is important concern in cloud. Confidentiality, Integrity, and Availability (CIA) are some security dimensions. In this paper, we are providing an improved technique to provide confidentiality of data. The proposed encryption and decryption algorithm achieves better time and storage complexity than the existing ELGamal algorithm. We have implemented this algorithm in Java and run this in different data set available in internet.


Cloud Computing Cloud Provider Cloud Storage Cloud Service Provider Encrypt Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    R. Buyya, C. Vecchiola, S.T. Selvi, Mastering Cloud Computing (McGraw-Hill, New Delhi, 2013)Google Scholar
  2. 2.
  3. 3.
    A.D.P. Balboni, Data protection and data security issues related to cloud computing in the EU. in ISSE 2010 Securing Electronic Business Processes, Springer, 2010, pp. 163–172.[Guerrilla%20Open%20Access]/Norbert%20Pohlmann,%20Helmut%20Reimer,%20Wolfgang%20Schneider%20-%20ISSE%202010%20Securing%20Electronic%20Business%20Processes.pdfGoogle Scholar
  4. 4.
  5. 5.
    A.K. Mishra, P. Matta, E.S. Pilli, R.C. Joshi, Cloud forensics: state-of-the-art and research challenges. in International Symposium on Cloud and Services Computing (ISCOS), 2012, pp. 164–170.
  6. 6.
    T. Yubo, W. Xinlei, Research of cloud computing data security technology. in 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012, pp. 2781–2783.
  7. 7.
    M. Christodorescu, R. Sailer, D.L. Schales, D. Sgandurra, D. Zamboni, Cloud security is not (just) virtualization security. in Proceedings of the 2009 ACM workshop on Cloud Computing Security, ACM, 2009, pp. 97–102.
  8. 8.
    Z. Minqi, Z. Rong, X. Wei, Q. Weining, Z. Aoying, Security and privacy in cloud computing: a survey. in Sixth International Conference on Semantics Knowledge and Grid (SKG), 2010, pp. 105–112.
  9. 9.
    Z. Gansen, R. Chunming, L. Jin, Z. Feng, T. Yong, Trusted data sharing over untrusted cloud storage providers. in IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), 2010, pp. 97–103.
  10. 10.
    P. Prasad, B. Ojha, R.R. Shahi, R. Lal, A. Vaish, U. Goel, 3 dimensional security in cloud computing. in 3rd International Conference on Computer Research and Development (ICCRD), 2011, pp. 198–201.
  11. 11.
    S.K. Sood, A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35, 1831–1838 (2012)CrossRefGoogle Scholar
  12. 12.
    D. Zissis, D. Lekkas, Addressing cloud computing security issues. Elsevier 28, 583–592 (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Pratyush Ranjan
    • 1
    Email author
  • Preeti Mishra
    • 1
  • Jaiveer Singh Rawat
    • 1
  • Emmanuel S. Pilli
    • 1
  • R. C. Joshi
    • 1
  1. 1.Department of Computer Science and EngineeringGraphic Era UniversityDehradunIndia

Personalised recommendations