Abstract
Cloud computing is a paradigm where tasks are assigned to a combination of connections, software and services accessed over a network. Clouds provide processing power, which is made possible through distributed computing .In the Cloud Technology most organizations have own challenges when it comes to handle both critical and confidential information. The major challenge in cloud technology is how effectively the information is uploaded to the virtual data centers to ensure the privacy. To enhance the privacy the available existing cryptography techniques are symmetric and asymmetric in nature. We are focusing on enhancing the privacy when the information is uploaded with virtual data centers. In this context, our study is mainly focusing on encrypting the information before uploading with virtual data centers; we propose to implement using DES(Data Encryption Standards), as it is proved the best encryption performance results in terms of computing time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bakshi, R., Jhon, D.: Cloud computing is here to stay and promises a fresh approach to the IT ecosystem. Set Labs Briefings 7(7) (2009)
Gens, F.: What User Want from IT: Speed, Relevance, Information and Innovation, IDC exchange ( March 2008)
Gens, F.: IT Cloud Services User Survey, pt.3: What Users Want from Cloud Services Providers (October 2008)
Foley, J.: 20 Cloud Computing Startups You Should Kow. Information Week (September 2008)
Sreenivas, V., Narasimham, C.: A Cloud Model To Implement SaaS. Advance Material Research Journal (July 2011)
Kumar, S., Subramanian, P.: Ensuring data storage security in cloud computing. PDGC (2010)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: INFOCOM (2010)
Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and Privacy in Cloud Computing. In: SKG (2010)
Verma, O.P., Agarwal, R., Dafouti, D.: Performance analysis of data encryption algorithms. In: ICECT (2011)
Liu, M.-S., Zheng, J.-W., Lu, J.-G.: An Implement of DES for Keeping Length Identical and Its Application (August 2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Sreenivas, V., ArunaKumari, B., VenkataRao, J. (2012). Enhancing the Security for Information with Virtual Data Centers in Cloud. In: Zhang, Y. (eds) Future Wireless Networks and Information Systems. Lecture Notes in Electrical Engineering, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27323-0_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-27323-0_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27322-3
Online ISBN: 978-3-642-27323-0
eBook Packages: EngineeringEngineering (R0)