Abstract

All the associations are genuine thoughts to receive the cloud computing administrations, seeing its advantages as far as cost, openness, accessibility, adaptability and profoundly computerized procedure of upgrading. Cloud computing upgrade the present capacities progressively without further speculation. Cloud computing is a band of assets, applications, and administrations. With the execution of cloud computing, associations have solid worries about the security of their information. The research focuses on the security issues of cloud services. The AES and RSA algorithms will be verified on five parameters key generation time, encryption execution time, memory usage, file uploading time and file downloading time. The CloudSim simulator will be used to find results that the RSA is performing much better than AES in terms of encryption execution time.

Highlights

  • Today is the era of Cloud Computing Technology in IT Industries

  • Cloud computing network simulator CloudSim is used in the evaluation of different scenarios using three parameters to judge the performance of cloud computing services provided by Cloud Service Provider (CSP)

  • Information technology brought a revolution in form of cloud computing, a lot of researchers had made a lot of effort to resolve cloud computing issues and they had addressed different data security issues but still, there are various problems related to data security

Read more

Summary

Introduction

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing, which is based on the Internet has the most powerful architecture of computation. Public Cloud: is available to everyone who needs to get the organizations of dispersed figuring and the affiliation who is giving this server is the proprietor of the cloud. There is a layered framework is available that ensures a security inappropriate processing environment The second layer is passed to the stockpiling layer This layer has a point of confinement base which merges assets from different cloud association suppliers to accumulate a colossal virtual stockpiling framework. There are distinctive safety issues for Cloud Computing that are showing in figure 3 as it fuses various advances counting virtualization, data security, identity Privacy, location Privacy, Data Privacy, Mobile Device Security, Mobile Cloud Applications Security, Partitioning and Offloading Security. Stage incorporates putting away information, grouping, list building, and encryption and message verification code [11, 12]

Literature Review
Proposed Methodology
CloudSim Cloud Computing Simulator
Cryptography Algorithms for Data Security Mechanism
Discussion
Key Generation Time
Encryption Execution Time
File Uploading Time
File Downloading Time
Resource Utilization Time
Resource Utilization Threshold
Energy consumption Time
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.