Second International Conference on Advances in Computing, Electronics and Communication - ACEC 2014
Author(s) : P PREMCHAND, S RAGHU, V PRAVEEN KUMAR
Cryptography is a process of transforming data to make them secure and difficult to intruders. The past idea of cryptography is only encryption and decryption, this tool is a process to send data for a given request using secret keys(secure routing) but now cryptography involves symmetric key encipherment, asymmetric key encipherment and hashing. Our goal is to implement crypt analysis into cloud computing system, recognize generate in human understandable way. This work shows the risk and problems in cloud computing while implementing the technology (intrusion). Few encryption techniques are importance for this research, experiment design of proposed system and cryptography application. Best effort shows that we can also apply mining techniques on cloud computing to protect from intrusion have not been implemented before. In this paper, a survey while implementing crypt analysis into cloud computing system a challenge of the different security risks an exposed.