Secure File Storage System Using Cloud
DOI:
https://doi.org/10.32628/IJSRSET25122213Keywords:
Cloud Computing, Security, Encryption, Decryption, AES, DESAbstract
Cloud computing basically comes to focus on IT, a way to increase capacity or add potentiality on the fly without investing in new infrastructure, training new personnel, or licensing new software. It encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends its existing capabilities. It is often provided "as a service" over the Internet, typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). Microsoft Azure and Google App Engine are the examples of platform as a service. The fast growth in field of "cloud computing" also increases rigorous security concerns. In today’s world most of the communication is done using electronic media. Data Security is widely used to ensure security in communication, data storage and transmission. We have Advanced Encryption Standard (AES) which is accepted as a symmetric cryptography standard for transferring block of data securely. The available AES algorithm is used for text data and it is also suitable for image encryption and decryption to protect the confidential image data from an unauthorized access. This project proposes a method in which the image data is an input to AES Encryption to obtain the encrypted image, and the encrypted image is the input to AES Decryption to get the original image.
Downloads
References
William Stallings, “Advance Encryption Standard,” in Cryptography and Network Security, 4th Ed., India : PEARSON , pp. 134–165.
Atul Kahate, “Computer-based symmetric key cryptographic algorithm”, in Cryptography and Network Security, 3th Ed. New Delhi : McGraw-Hill, pp. 130-141.
Manoj .B,Manjula N Harihar (2012, June). “Image Encryption and Decryption using AES”, International Journal of Engineering and Advance Technology (IJEAT) volume-1, issue-5, pp.290-294.
Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2008). Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12), 280-286.
Arora, P., Singh, A., & Tyagi, H. (2012). Evaluation and comparison of security issues on cloud computing environment. World of Computer Science and Information Technology Journal (WCSIT), 2(5), 179-183.
Alanazi, H., Zaidan, B. B., Zaidan, A. A., Jalab, H. A., Shabbir, M., & Al-Nabhani, Y. (2010). New comparative study between DES, 3DES and AES within nine factors. arXiv preprint arXiv:1003.4085.
Mandal, A. K., Parakash, C., & Tiwari, A. (2012, March). Performance evaluation of cryptographic algorithms: DES and AES. In 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science (pp. 1-5). IEEE.
Kakkar, A., Singh, M. L., & Bansal, P. K. (2012). Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication. In in Multinode Network”, International Journal of Engineering and Technology Volume.
Sutton, E. Latency, Packet Loss and Encryption using DES with a VPN.
S. Pavithra, E. Ramadevi,(2012), Performance Evaluation of Symmetric Algorithmns.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.