Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm

Salim Ali Abbas, Malik Qasim Mohammed Published in Security

International Journal of Applied Information Systems
Year of Publication: 2017
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors:Salim Ali Abbas, Malik Qasim Mohammed
Download full text
  1. Salim Ali Abbas and Malik Qasim Mohammed. Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm. International Journal of Applied Information Systems 12(8):27-32, November 2017. URL, DOI BibTeX

    	author = "Salim Ali Abbas and Malik Qasim Mohammed",
    	title = "Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "November 2017",
    	volume = 12,
    	number = 8,
    	month = "Nov",
    	year = 2017,
    	issn = "2249-0868",
    	pages = "27-32",
    	url = "",
    	doi = "10.5120/ijais2017451715",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"


Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or indirectly such as email that usually utilized as an application of cloud computing. Everyone can get to the mail anyplace whenever. The email account is not obvious on personal PC but rather a person need to get to his account with the assistance of web. Like an email cloud computing give numerous different services, for example accessing to various applications, saving of any sort of information and so on. Clients can normally access and store information without fearing over how these services are given to client. Because of this adaptability everybody is exchanging information to the cloud, to store information on cloud client needs to send their information to the third party who will oversee and store information, so it is crucial for an organization to secure that information. Most difficult part is how to protect these data in light of the fact that these information can store anyplace in the cloud. This paper presents the proposed cryptographic algorithm used to address this issue.


  1. V.Masthanamma, G.Lakshmi Preya,”An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm” , International Journal of Innovative Research in Science Engineering and Technology , Vol. 4, Issue 3, March 2015 .
  2. Poonam Rani, Kavita Taneja, ”Service and Deployment Models for Cloud Computing Environment”, International Journal of Enhanced Research in Science Technology & Engineering, Vol. 3 Issue 1, January-2014, Available online at:
  3. Kanika Gulati, Kamal Kumar, Sharad Chouhan, ”Cloud Computing & Its Deployment Models” , International Journal of Recent Research Aspects Feb 2015.
  4. Sana Belguith ,Abderrazak Jemai , Rabah Attia,” Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm”, The Eleventh International Conference on Autonomic and Autonomous Systems, 2015 .
  5. Abhuday Tripathi , Parul Yadav, ” Enhancing Security of Cloud Computing using Elliptic Curve Cryptography”, International Journal of Computer Applications ,Volume 57– No.1, November 2012 .
  6. Shakeeba S. Khan, R.R. Tuteja, ” Security in Cloud Computing using Cryptographic Algorithms” , International Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2015 .
  7. Nazar K. Khorsheed, Omeed K.Khorsheed, Majdi Z. Rashad,Taher T. Hamza, ” Proposed Encryption Technique for Cloud Applications” , International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September 2015 .
  8. B.Thimma Reddy, K.Bala Chowdappa, S.Raghunath Reddy, ” Cloud Security using Blowfish and Key Management Encryption Algorithm” , International Journal of Engineering and Applied Sciences (IJEAS), Volume-2, Issue-6, June 2015 .
  9. Maha TEBAA, Said EL HAJII, ” Secure Cloud Computing through Homomorphic Encryption” , International Journal of Advancements in Computing Technology(IJACT) Volume5, Number16, December 2013 .
  10. Vikas Tyagi , Shrinivas Singh , " Enhancement Of RC6 (Rc6_En) Block Cipher Algorithm And Comparison With RC5 & RC6 " , Journal of Global Research in Computer Science , Volume 3, No. 4, April 2012 .
  11. Comodo Web Inspector , Administrator Guide Version 1.0, also it available on
  12. Acunetix Web Vulnerability Scanner User Manual V7, March 2011, also it available on
  13. Russ McRee , OWASP ZAP – Zed Attack Proxy , Information Systems Security Association (ISSA) 2011 , also it available on


Cloud Computing, Encryption, Decryption, RC6 algorithm