Loading

A Novel Cryptosystem for Files Stored in Cloud using NTRU Encryption Algorithm
N. Suba Rani1, A. Noble Mary Juliet2, S. Arunkumar3

1Dr. N. Suba Rani, Department of Computer Science and Engineering, Dr Mahalingam College of Engineering and Technology, Pollachi, India.
2Dr. A. Noble Mary Juliet, Department of Computer Science and Engineering, Dr Mahalingam College of Engineering and Technology, Pollachi, India.
3S.Arunkumar, Department of Computer Science and Engineering, Dr Mahalingam College of Engineering and Technology, Pollachi, India. 

Manuscript received on April 30, 2020. | Revised Manuscript received on May 06, 2020. | Manuscript published on May 30, 2020. | PP: 2127-2130 | Volume-9 Issue-1, May 2020. | Retrieval Number: A2536059120/2020©BEIESP | DOI: 10.35940/ijrte.A2536.059120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The cloud refers to a set of services and infrastructure that are accessed via the internet. the cloud infrastructure is shared by many users each one performing different tasks. in order to prevent data leakage in the cloud the Cloud Service Provider should employ an Encryption Algorithm to protect the data of the users. Since the cloud service providers and large amount of data the Encryption Algorithm should be very efficient in terms of computational cost and time. Current Cloud service providers you son of the following algorithms to encrypt and decrypt the data Advanced encryption standard(AES), Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography(ECC).The encryption for cloud should be chosen such that it is computationally efficient for the Cloud Service Provider and also meets the security requirement of the user.
Keywords: Advanced encryption standard (AES), Rivest–Shamir Adleman (RSA), Elliptic Curve Cryptography (ECC), NTRU Encryption.
Scope of the Article: Cryptography and Applied Mathematics