Abstract
Cloud computing declared among the fastest growing technology. The amount of users using this technology has exploded. Therefore, cloud users expect their data to be safe on the cloud. We can secure the data from being accessed illegally by encrypting it with a key with various methods likewise Advanced and Data encryption standard. However, the issue with these encryption methods is that they are very complex and have a lengthy computing time due to finite key space. To overcome these problems, Cloud Service Providers (CSP) which is becoming a great area to have researched for ensuring the security of data with minimum processing time. This research paper emphasizes various secured encryption techniques which have efficient computing time. This paper focus on the complexity, efficiency, and the security of the algorithm used.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Vijay GR, Rama Mohan Reddy A (2012) An efficient security model in cloud computing based on soft computing techniques. Int J Comput Appl 60(14)
Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutor 15(2):843–859
Singhal M et al (2013) Collaboration in multicloud computing environments: Framework and security issues. Computer 46(2):76–84
Sengupta N, Holmes J (2013) Designing of cryptography based security system for cloud computing. In: 2013 International conference on cloud and ubiquitous computing and emerging technologies (CUBE). IEEE
Singh G, Supriya (2013) Modified vigenere encryption algorithm and its hybrid implementation with Base64 and AES. In: 2013 2nd International conference on advanced computing, networking and security (ADCONS). IEEE
Sindhuja K, Devi PS (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inf Technol 5(1):414–416
Almarimi A et al (2012) A new approach for data encryption using genetic algorithms. Adv Intell Syst Comput 167:783–791
Shah Kruti R, Gambhava B (2012) New approach of data encryption standard algorithm. Strings 1
Thirer N (2013) A pipelined FPGA implementation of an encryption algorithm based on genetic algorithm. In: SPIE defense, security, and sensing. International Society for Optics and Photonics
Siddiqa A et al (2016) A survey of big data management: taxonomy and state-of-the-art. J Netw Comput Appl 71:151–166
Bono SC et al (2014) Systems and methods for secure workgroup management and communication. U.S. Patent No. 8,898,464. 25 Nov 2014
Bruen AA, Forcinito MA (2011) Cryptography, information theory, and error-correction: a handbook for the 21st century, vol 68. Wiley
Soni G, Gupta U, Singh N (2014) Analysis of modified substitution encryption techniques, pp 643–647
Micciancio D (2010) A first glimpse of cryptography’s Holy Grail. Commun ACM 53(3):96–97
Yang K, Jia X (2012) Attributed-based access control for multi-authority systems in cloud storage. In: 2012 IEEE 32nd international conference on distributed computing systems (ICDCS). IEEE
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, A., Sharma, S. (2019). Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme. In: Rathore, V., Worring, M., Mishra, D., Joshi, A., Maheshwari, S. (eds) Emerging Trends in Expert Applications and Security. Advances in Intelligent Systems and Computing, vol 841. Springer, Singapore. https://doi.org/10.1007/978-981-13-2285-3_20
Download citation
DOI: https://doi.org/10.1007/978-981-13-2285-3_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2284-6
Online ISBN: 978-981-13-2285-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)