Skip to main content

Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 841))

Abstract

Cloud computing declared among the fastest growing technology. The amount of users using this technology has exploded. Therefore, cloud users expect their data to be safe on the cloud. We can secure the data from being accessed illegally by encrypting it with a key with various methods likewise Advanced and Data encryption standard. However, the issue with these encryption methods is that they are very complex and have a lengthy computing time due to finite key space. To overcome these problems, Cloud Service Providers (CSP) which is becoming a great area to have researched for ensuring the security of data with minimum processing time. This research paper emphasizes various secured encryption techniques which have efficient computing time. This paper focus on the complexity, efficiency, and the security of the algorithm used.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Vijay GR, Rama Mohan Reddy A (2012) An efficient security model in cloud computing based on soft computing techniques. Int J Comput Appl 60(14)

    Google Scholar 

  2. Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutor 15(2):843–859

    Article  Google Scholar 

  3. Singhal M et al (2013) Collaboration in multicloud computing environments: Framework and security issues. Computer 46(2):76–84

    Article  Google Scholar 

  4. Sengupta N, Holmes J (2013) Designing of cryptography based security system for cloud computing. In: 2013 International conference on cloud and ubiquitous computing and emerging technologies (CUBE). IEEE

    Google Scholar 

  5. Singh G, Supriya (2013) Modified vigenere encryption algorithm and its hybrid implementation with Base64 and AES. In: 2013 2nd International conference on advanced computing, networking and security (ADCONS). IEEE

    Google Scholar 

  6. Sindhuja K, Devi PS (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inf Technol 5(1):414–416

    Google Scholar 

  7. Almarimi A et al (2012) A new approach for data encryption using genetic algorithms. Adv Intell Syst Comput 167:783–791

    Google Scholar 

  8. Shah Kruti R, Gambhava B (2012) New approach of data encryption standard algorithm. Strings 1

    Google Scholar 

  9. Thirer N (2013) A pipelined FPGA implementation of an encryption algorithm based on genetic algorithm. In: SPIE defense, security, and sensing. International Society for Optics and Photonics

    Google Scholar 

  10. Siddiqa A et al (2016) A survey of big data management: taxonomy and state-of-the-art. J Netw Comput Appl 71:151–166

    Article  Google Scholar 

  11. Bono SC et al (2014) Systems and methods for secure workgroup management and communication. U.S. Patent No. 8,898,464. 25 Nov 2014

    Google Scholar 

  12. Bruen AA, Forcinito MA (2011) Cryptography, information theory, and error-correction: a handbook for the 21st century, vol 68. Wiley

    Google Scholar 

  13. Soni G, Gupta U, Singh N (2014) Analysis of modified substitution encryption techniques, pp 643–647

    Google Scholar 

  14. Micciancio D (2010) A first glimpse of cryptography’s Holy Grail. Commun ACM 53(3):96–97

    Article  Google Scholar 

  15. Yang K, Jia X (2012) Attributed-based access control for multi-authority systems in cloud storage. In: 2012 IEEE 32nd international conference on distributed computing systems (ICDCS). IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, A., Sharma, S. (2019). Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme. In: Rathore, V., Worring, M., Mishra, D., Joshi, A., Maheshwari, S. (eds) Emerging Trends in Expert Applications and Security. Advances in Intelligent Systems and Computing, vol 841. Springer, Singapore. https://doi.org/10.1007/978-981-13-2285-3_20

Download citation

Publish with us

Policies and ethics