IJEME Vol. 5, No. 4, 8 Sep. 2015
Cover page and Table of Contents: PDF (size: 248KB)
Full Text (PDF, 248KB), PP.21-26
Views: 0 Downloads: 0
Cloud computing, information security, client side encryption, Java applet
The amount of data that is generated each day is rapidly increasing so that the traditional ways of data storage seems to be inadequate. Cloud Computing has helped a lot to solve the storage issues but fear of data leakage hinders its widespread acceptance. Even though the public clouds like Amazon, Google etc store the data in encrypted form, data loss can still occur during transmission. The only practical solution is to upload encrypted data to cloud. Hence users should have an additional software or application to encrypt the data before uploading and decrypt the data after retrieval. This article analyzes different solutions for implementing such applications. The article also describes about the cryptographic primitives that can be added for enforcing security.
Lija Mohana, Sudheep Elayidom M.,"A Practical Scheme for Implementing Client Side Encryptions and Decryptions", IJEME, vol.5, no.4, pp.21-26, 2015. DOI: 10.5815/ijeme.2015.04.03
[1]Won Kim, Sungkyunkwan University, Suwon, S. Korea, "Cloud Computing: Today and Tomorrow", Journal of Object Technology, Vol. 8, No. 1, January-February 2009.
[2]E. Cronin, M. Sherr, and M. Blaze, "The Eavesdropper's Dilemma", Technical Report MS-CIS-05-24. University of Pennsylvania. 2005.
[3]Pankaj Kamthan, "Java Applets in Education", Indian Institute of Technology, Bombay, http://ekalavya.iitb.ac.in/documents/java.pdf.
[4]J.K.Haris,"Understanding SSL/TLS", https://computing.ece.vt.edu/~jkh/Understanding_SSL_TLS.pdf
[5]Jos Dirksen, "Jetty a Lightweight, Open-Source Web Server and Servlet Container", DZone technical articles, December, 2012.
[6]"Web API Design Crafting Interfaces that Developers Love", https://pages.apigee.com/rs/apigee/images/api-design-ebook-2012-03.pdf.
[7]Gusustav J. Simmons, "Symmetric and Asymmetric Encryption", Computing Surveys, Vol. 11, No. 4, December 1979.
[8]Alan Kaminsky, Michael Kurdziel, Stanisław Radziszowski, "An Overview of Cryptanalysis Research for the Advanced Encryption Standard ", Springer, December 2009.
[9]Somani, U.; Lakhani, K.; Mundra, M., "Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing", IEEE International Conference onParallel Distributed and Grid Computing (PDGC), October, 2010.
[10]https://www.digitalocean.com/community/tutorials/java-keytool-essentials-working-with-java-keystores.