Loading

Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing
Harihara Krishnan R1, Aby John2, A. Amali Asha3, Venisha Leena Mary R4

1Harihara Krishnan R, Research Scholar, Department of Computer Science, Presidency College (Autonomous), Chennai
2Aby John, Research Scholar, PG and Research Department of English, Presidency College (Autonomous), Chennai.
3Dr. A. Amali Asha, Assistant Professor, Department of Computer Science, Loyola College (Autonomous), Chennai.
Venisha Leena Mary R, Research Scholar, Department of Computer Science, Periyar University, Salem, Chennai.
Manuscript received on May 16, 2020. | Revised Manuscript received on May 21, 2020. | Manuscript published on June 10, 2020. | PP: 971-975 | Volume-9 Issue-8, June 2020. | Retrieval Number: H6780069820/2020©BEIESP | DOI: 10.35940/ijitee.H6780.069820
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile devices often store data in cloud computing storage based on the increasing availability of the users. But security is the major issue in cloud computing. Sensitive information is stored and provided across internet to make sure that the data is protected with security. In this paper, the concept of data privacy is given more importance with regard to the major problem of reducing outsourced data usage. Mobile computing has memory storage and power resources as limitations. But cryptography is a concept which provides some sort of security enhancement that ensures the authentication and the availability of data integrity with confidentiality. Certain algorithms are used for ensuring an increase in security such as AES, DES, and Blowfish. Experimental results are computed and analyzed to level up the performance using cryptographic algorithms. Results are shown in order to assure resistance among the above techniques. Choosing an apt algorithm will quench the requirements of the future. 
Keywords: AES (Advanced Encryption Standard), DES (Data Encryption Standard), Blowfish, Cryptography, Confidentiality, Integrity of data.
Scope of the Article: Cloud Computing