Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 328))

Abstract

Cloud computing is a technology that being widely adopted by many organizations like Google, Microsoft etc in order to make the resources available to multiple users at a time over the internet. Many issues are identified due to which cloud computing is not adopted by all users till now. The aim of this paper is to analyze the performance of the encryption algorithms in order to improve the data integrity in SaaS cloud. The proposed modified algorithm encrypts the data from different users using cryptographic algorithms namely: RSA, Bcrypt and AES. The algorithm is selected by user based on the level of security needed to be applied to the user’s data. Performance analysis of the given framework and algorithm is done using CloudSim. From our obtained results this could be easily found that the time taken for encryption of data using the discussed framework and proposed algorithms is much less in comparison to various other techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shaikh, F.B., Haider, S.: Security Threats in Cloud Computing. In: 6th International Conference on Internet Technology and Secured Transactions, UAE, pp. 11–14 (2011)

    Google Scholar 

  2. Kumar, S., Goudar, R.H.: Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey. International Journal of Future Computer and Communication 1(4) (December 2012)

    Google Scholar 

  3. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. Springer (2010)

    Google Scholar 

  4. Naruchitparames, J., Giines, M.H.: Enhancing Data Privacy and Integrity in the Cloud. IEEE (2011)

    Google Scholar 

  5. Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments. Published by Elsevier Ltd. (2011)

    Google Scholar 

  6. Chalse, R., Selokara, A., Katara, A.: A New Technique of Data Integrity for Analysis of the Cloud Computing Security. In: 2013 5th International Conference on Computational Intelligence and Communication Networks (2013)

    Google Scholar 

  7. Sravan Kumar, R., Saxena, A.: Data integrity proofs in cloud storage. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–4. IEEE (2011)

    Google Scholar 

  8. Raju, R.V., Vasanth, M., Udaykumar, P.: Data integrity using encryption in cloud computing. Journal of Global Research in Computer Science 4(5) (2013)

    Google Scholar 

  9. Kumar, P., Sehgal, V.K., Chauhan, D.S., Gupta, P.K., Diwakar, M.: Effective Ways of Secure, Private and Trusted Cloud Computing. IJCSI International Journal of Computer Science Issues 8(3(2)) (2011)

    Google Scholar 

  10. Eswaran, S., Abburu, S.: Identifying Data Integrity in the Cloud Storage. IJCSI International Journal of Computer Science Issues 9(1) (March 2012)

    Google Scholar 

  11. Rana, P., Gupta, P.K., Siddavatam, R.: Combined and Improved Framework of Infrastructure as a Service and Platform as a Service in Cloud Computing. In: Babu, B.V., Nagar, A., Deep, K., Pant, M., Bansal, J.C., Ray, K., Gupta, U. (eds.) 2012 Second International Conference on Soft Computing for Problem Solving (SocProS 2012). AISC, vol. 236, pp. 1–8. Springer, Heidelberg (2014)

    Google Scholar 

  12. Thakur, A.S., Gupta, P.K.: Framework to Improve Data Integrity in Multi Cloud Environment. International Journal of Computer Applications 87(10) (February 2014)

    Google Scholar 

  13. Mehta, A., Sahu, R.K., Awasthi, L.K.: Robust Data Security for Cloud while using Third Party Auditor. International Journal of Advanced Research in Computer Science and Software Engineering 2(2) (February 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anandita Singh Thakur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Thakur, A.S., Gupta, P.K., Gupta, P. (2015). Handling Data Integrity Issue in SaaS Cloud. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12012-6_15

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12011-9

  • Online ISBN: 978-3-319-12012-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics