Abstract
Cloud computing is a technology that being widely adopted by many organizations like Google, Microsoft etc in order to make the resources available to multiple users at a time over the internet. Many issues are identified due to which cloud computing is not adopted by all users till now. The aim of this paper is to analyze the performance of the encryption algorithms in order to improve the data integrity in SaaS cloud. The proposed modified algorithm encrypts the data from different users using cryptographic algorithms namely: RSA, Bcrypt and AES. The algorithm is selected by user based on the level of security needed to be applied to the user’s data. Performance analysis of the given framework and algorithm is done using CloudSim. From our obtained results this could be easily found that the time taken for encryption of data using the discussed framework and proposed algorithms is much less in comparison to various other techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Shaikh, F.B., Haider, S.: Security Threats in Cloud Computing. In: 6th International Conference on Internet Technology and Secured Transactions, UAE, pp. 11–14 (2011)
Kumar, S., Goudar, R.H.: Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey. International Journal of Future Computer and Communication 1(4) (December 2012)
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. Springer (2010)
Naruchitparames, J., Giines, M.H.: Enhancing Data Privacy and Integrity in the Cloud. IEEE (2011)
Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments. Published by Elsevier Ltd. (2011)
Chalse, R., Selokara, A., Katara, A.: A New Technique of Data Integrity for Analysis of the Cloud Computing Security. In: 2013 5th International Conference on Computational Intelligence and Communication Networks (2013)
Sravan Kumar, R., Saxena, A.: Data integrity proofs in cloud storage. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–4. IEEE (2011)
Raju, R.V., Vasanth, M., Udaykumar, P.: Data integrity using encryption in cloud computing. Journal of Global Research in Computer Science 4(5) (2013)
Kumar, P., Sehgal, V.K., Chauhan, D.S., Gupta, P.K., Diwakar, M.: Effective Ways of Secure, Private and Trusted Cloud Computing. IJCSI International Journal of Computer Science Issues 8(3(2)) (2011)
Eswaran, S., Abburu, S.: Identifying Data Integrity in the Cloud Storage. IJCSI International Journal of Computer Science Issues 9(1) (March 2012)
Rana, P., Gupta, P.K., Siddavatam, R.: Combined and Improved Framework of Infrastructure as a Service and Platform as a Service in Cloud Computing. In: Babu, B.V., Nagar, A., Deep, K., Pant, M., Bansal, J.C., Ray, K., Gupta, U. (eds.) 2012 Second International Conference on Soft Computing for Problem Solving (SocProS 2012). AISC, vol. 236, pp. 1–8. Springer, Heidelberg (2014)
Thakur, A.S., Gupta, P.K.: Framework to Improve Data Integrity in Multi Cloud Environment. International Journal of Computer Applications 87(10) (February 2014)
Mehta, A., Sahu, R.K., Awasthi, L.K.: Robust Data Security for Cloud while using Third Party Auditor. International Journal of Advanced Research in Computer Science and Software Engineering 2(2) (February 2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Thakur, A.S., Gupta, P.K., Gupta, P. (2015). Handling Data Integrity Issue in SaaS Cloud. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-12012-6_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12011-9
Online ISBN: 978-3-319-12012-6
eBook Packages: EngineeringEngineering (R0)