Login New user?  
01-Applied Mathematics & Information Sciences
An International Journal
               
 
 
 
 
 
 
 
 
 
 
 
 
 

Content
 

Volumes > Volume 13 > No. S1

 
   

Improving Security In Cloud By Key Enhancement In Advanced Encryption Standard Using Particle Swarm Optimization

PP: 381-389
doi:10.18576/amis/13S141
Author(s)
Venkata Koti Reddy. G, Srihari. K, Karthik. S,
Abstract
Cloud computing is an internet based service to provide the database storage, applications sharing and utilization of the IT resources for either by pay or at a free cost. When the services are at free cost the access to the resources are in a limited manner. The reason behind the development of cloud computing technology is to easy access of all resources with less cost. This technology is classified based on the service and architecture. Based on architecture, the cloud computing is classified as a private, public, hybrid and community cloud. Based on the services, it is classified as Infrastructure as a Service, platform as a Service and software as a service. A private cloud is one in which all infrastructures and the designed group accesses resources. The resources, which are common for all, and access based on money is called public cloud. Hybrid cloud is the one in which uses the private cloud for storage and public cloud for maintenance during high demand. In IaaS the third party for access provides the resources to the customers over the internet. The application and tools are developed by the third party host and provide as a service to the customer is PaaS. In SaaS the software model is used for the access. In cloud, a variety of data is stored such as the personal information, official data and other high confidential data. In such cases, the data integrity is an important one, the data is preserved by employing the security to the data in the cloud. The security is provided by encrypting the information before and after the process in the cloud. The encryption provides the user for its own information control and prevent from the third party access. In general, encryption methods are AES, RSA or blowfish is employed. In this paper, the AES encryption is improved by changing the key based on the input of the user using PSO algorithm. Here this type of AES-PSO encryption protects the users from third party access, because the key is changing one hence the data cannot be easily cracked by the malicious users

  Home   About us   News   Journals   Conferences Contact us Copyright naturalspublishing.com. All Rights Reserved