2013
DOI: 10.5120/11422-6766
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Cloud Computing Security using AES Algorithm

Abstract: With the tremendous growth of sensitive information on cloud, cloud security is getting more important than even before. The cloud data and services reside in massively scalable data centers and can be accessed everywhere. The growth of the cloud users has unfortunately been accompanied with a growth in malicious activity in the cloud. More and more vulnerabilities are discovered, and nearly every day, new security advisories are published. Millions of users are surfing the Cloud for various purposes, therefor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…The use of cyber foraging in the system requires the installation of alternative software like the spectra and chroma intended to facilitate offloads of the signals in the communication network anchored on cloudlet platform. The presence of a visual machine operates by copying, communication signals from the mobile gadget to the existing infrastructure through the dedicated cloud network [5].…”
Section: Introductionmentioning
confidence: 99%
“…The use of cyber foraging in the system requires the installation of alternative software like the spectra and chroma intended to facilitate offloads of the signals in the communication network anchored on cloudlet platform. The presence of a visual machine operates by copying, communication signals from the mobile gadget to the existing infrastructure through the dedicated cloud network [5].…”
Section: Introductionmentioning
confidence: 99%
“…The security and privacy of user's data that is stored on cloud is one of the major issues needed to be resolved in MCC [12] because MCC users may store all confidential data in the cloud for either a short or long term usage with little or no control over it while a malicious mind in disguise of a cloud staff may access the confidential data, steal and pass it on to user's competitors [19]. Therefore, the security of the data in the cloud becomes a real issue.…”
Section: MCC Issuesmentioning
confidence: 99%
“…In [1], the Advance Encryption Standard is proposed for cloud Security. AES is a block cipher having block length of 128 bits.…”
Section: Related Workmentioning
confidence: 99%
“…The encryption process contains 10 rounds of processing for 128-bit keys. Except for the last round in each case, all other rounds are identical [1]. 16 byte encryption key, in the form of 4-byte words is expanded into a key schedule consisting of 44 4-byte words [6].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation