Implementation of Security Algorithm for Data Security in Cloud Computing
Mohd Amir Siddiqui1, M Akheela Khanum2

1Mohd Amir Siddiqui, Department of CSE, Integral University, Lucknow (U.P), India.
2Dr. M. Akheela Khanum, Department of CSE, Integral University, Lucknow (U.P), India.
Manuscript received on 07 March 2019 | Revised Manuscript received on 20 March 2019 | Manuscript published on 30 March 2019 | PP: 809-813 | Volume-8 Issue-5, March 2019 | Retrieval Number: E2944038519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Cloud technology offers on-demand access/allocation of resources (such as storage, computing) as guaranteed and reliable services. Cloud users valuable and confidential data is stored on a virtual server that may be shared by multiple users. This stored data is prone to attacks (access or alteration) for malicious intentions by an unauthorized users or program. So, security of data is a big challenge for cloud computing. However, such an instance can be prevented if the stored data is encrypted. Existing encryptions employ algorithms that are towards the end of life, thanks to ever improving computing technologies. This paper proposes an encryption algorithm which is efficient and optimized for data security in cloud computing. The proposed Algorithm performs multiple rounds of encryption operations based on the length of the encryption key, harnessing the power of parallel processing to ensure better performance. The main features of this algorithm are that it uses a larger key and is designed in a way that fragment of code can also be executed in parallel.
Keyword: Cloud Security, Data Security, Encryption, Parallel Processing.
Scope of the Article: Cloud Computing