Key Generation Algorithm Coupled with DES for Securing Cloud Storage
Mohd. Tajammul1, Rafat Parveen2

1Mohd. Tajammul, Department of Computer Science, Jamia Millia Islamia, New Delhi, India.
2Rafat Parveen, Department of Computer Science, Jamia Millia Islamia, New Delhi, India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1452-1458 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7461068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is a very fruitful technology providing uncountable services to the customers on pay per use basis. Many popular companies are offering cloud services in modern age of data and computation. Whenever a user transfer his data on cloud for computation or just for storing purpose, this data comes under the eyes of man-in-the-middle, Cloud Service Provider (CSP) and internal employees of CSP. Sudden attack on cloud storage in 2014 shows that the cloud is still in its early stage as 50 million users’ accounts were hacked in the attack. Lots of companies are there in market like Amazon Web Services (AWS) providing computation and storage but fear of hacking remains in the mind of data owner. Lots of algorithms have already been designed in this field but all of them seek for user to enter key. This research paper proposed a key generation algorithm which is coupled with Data Encryption Standard (DES) for generating unique key itself and subsequently encrypts data on the basis of key produced. The plus point behind designing this algorithm is not only to develop an automatic system which itself produce key for encryption but also making this complete process user independent. User need to upload the text data only, the key produced will be sent to user related to that particular data and encrypted data will be uploaded on cloud storage. The algorithm can be utilized in making cloud storage as a secure place to store data as well as it can be utilized while sending data outside boundaries of your organization.
Keywords: Cloud Computing, Cloud Storage, Cloud Computation, Cloud Security

Scope of the Article: Cloud Computing