Client/Server Model of Data Privacy using Extended Playfair Cipher for SaaS Applications on the Cloud
David Livingston J1, Kirubakaran E2
1David Livingston J, Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, South India – 641 114.
2Dr. Kirubakaran E, Professor, Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, South India – 641 114.
Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 1933-1936 | Volume-8 Issue-10, August 2019 | Retrieval Number: J92740881019/2019©BEIESP | DOI: 10.35940/ijitee.J9274.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud Computing is a paradigm of distributed computing that delivers on-demand and utility-based services to its customers. It provides a set of shared computing resources such as networking, servers, storage, and applications in the form of services to an organization or an individual. The major benefits of cloud computing include on-demand self-service and cost-effectiveness. For the customer, there is no up-front cost for setting up and running the applications on the cloud. Despite the benefits provided by various cloud services, the outsourcing of data storage and computation raise many new security issues. One of such security issues that have to be addressed before uploading our sensitive data to the cloud is data privacy. With the cloud model, end-users lose control over the physical location of data, because data will be stored and processed elsewhere on the globe and not in the local computer. Hence, we need an algorithm for encrypting the data that can be stored and retrieved from a database managed by the public cloud.
Keywords: Distributed Computing, Cloud Computing, Data Privacy, Encryption, Public Cloud
Scope of the Article: Cloud Computing and Innovative Cloud-Based Application Systems