{"title":"基于云计算的高级加密标准","authors":"Quazi Warisha Ahmed, S. Garg","doi":"10.1109/I-SMAC47947.2019.9032581","DOIUrl":null,"url":null,"abstract":"Today cloud computing is emerging as an indispensable factor in our day-to-day lives. Its fame is rising at an exponential rate along with its growth. It serves its client with distinct computing capabilities like computation, storage, networking, applications, etc., over the internet upon a particular request. Among all the above capabilities, storage plays a crucial role in facilitating its client by giving its framework on rent basis. Even though cloud computing is having a lot of benefits, its acceptance is still lagging behind as a result of security concerns. The information that we keep in clouds is likely to be abused by an unapproved individual or the cloud specialists to cooperate itself. The paper gives a brief idea of cloud computing data security, and various methods are used in ensuring the security of data and we have compared various encryption algorithm used for encrypting data in the cloud.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Cloud computing-based Advanced Encryption Standard\",\"authors\":\"Quazi Warisha Ahmed, S. Garg\",\"doi\":\"10.1109/I-SMAC47947.2019.9032581\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today cloud computing is emerging as an indispensable factor in our day-to-day lives. Its fame is rising at an exponential rate along with its growth. It serves its client with distinct computing capabilities like computation, storage, networking, applications, etc., over the internet upon a particular request. Among all the above capabilities, storage plays a crucial role in facilitating its client by giving its framework on rent basis. Even though cloud computing is having a lot of benefits, its acceptance is still lagging behind as a result of security concerns. The information that we keep in clouds is likely to be abused by an unapproved individual or the cloud specialists to cooperate itself. The paper gives a brief idea of cloud computing data security, and various methods are used in ensuring the security of data and we have compared various encryption algorithm used for encrypting data in the cloud.\",\"PeriodicalId\":275791,\"journal\":{\"name\":\"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SMAC47947.2019.9032581\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC47947.2019.9032581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Cloud computing-based Advanced Encryption Standard
Today cloud computing is emerging as an indispensable factor in our day-to-day lives. Its fame is rising at an exponential rate along with its growth. It serves its client with distinct computing capabilities like computation, storage, networking, applications, etc., over the internet upon a particular request. Among all the above capabilities, storage plays a crucial role in facilitating its client by giving its framework on rent basis. Even though cloud computing is having a lot of benefits, its acceptance is still lagging behind as a result of security concerns. The information that we keep in clouds is likely to be abused by an unapproved individual or the cloud specialists to cooperate itself. The paper gives a brief idea of cloud computing data security, and various methods are used in ensuring the security of data and we have compared various encryption algorithm used for encrypting data in the cloud.