Cryptographic Solutions for Cloud-Based Storage System
Anuj Kumar Yadav1, M.L. Garg2, Ritika3 

1Anuj Kumar Yadav, CSE, DIT University, Dehradun, India.
2Dr M.L. Garg, CSE, DIT University, Dehradun, India.
3Dr Ritika, MCA, DIT University, Dehradun, India.

Manuscript received on 05 March 2019 | Revised Manuscript received on 11 March 2019 | Manuscript published on 30 July 2019 | PP: 2079-2084 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2295078219/19©BEIESP | DOI: 10.35940/ijrte.B2298.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Nowadays cloud computing is a driving force which has a large impact on each aspect of our lives and widely used in today’s business structure. With its capacity and capability, it is widely accepted by many organizations and users. Cloud computing provides numerous benefits to end users and companies in terms of cost, maintenance, management due to which many organizations prefer to use its services with open hands. With the increasing demand, day-by-day service providers also increased and the user has a choice to choose the best one based on their demand Cloud Storage is one such service that provides cost effective storage solution to the users. They provide unlimited storage to the users based on the requirement and charge according to that only. User can rely on them for the storage but apart from the numerous benefits security and privacy remains the biggest concern whenever a user moves to cloud services. Security triad comprises of authentication, Integrity, and availability remains the concern for every user while moving towards cloud-based services. Almost everyday industry and academician working on finding an effective and efficient way, which could provide secure migration of user data in the cloud. One of the solutions could be the use of cryptographic techniques to provide data security. Cryptography is accepted largely to ensure the privacy and security of data in cloud computing. In this paper, several cryptographic technique discussed which are expected to provide the solution to the user’s problem when they tend to move towards cloud computing.
Index Terms: Cloud Storage, AES, Blowfish, DES, Diffie Hellman, RSA.

Scope of the Article: Discrete Optimization