How To Secure Cloud Computing

Size: px
Start display at page:

Download "How To Secure Cloud Computing"

Transcription

1 Volume 2, Issue 1, Jan - Feb, 2015 International Journal of Emerging Technology & Research ( ISSN (E): 2347 A New Trusted Security System For Cloud Computing Infrastructure K N V Satya Naresh,Divya Vani.Y Shri Vishnu Engineering College for Women Bhimavaram, Andhra Pradesh, India ISSN (E): ISSN (P): In today s era, cloud computing has captured the software market quite nicely. As the age growing cloud computing has become pure ubiquitous which has several services which contains a large infrastructure with large no of platforms and a lot of software. With all these things, here come the security issues because this freedom, dynamic platform and flexibility make it vulnerable to cyber attacks. Basically if we consider there are five main security concerns in cloud computing they are security myths about private cloud, lack of security visibility and risk awareness, security for storage, less secure apps and authentication and authorization. A lot of security techniques were developed for resolving these issues. Here in this paper we are doing survey on the techniques and propose a new model for cloud security system. 1. Introduction: Abstract: Today cloud computing is the most enticing technology due to vast growth in software and hardware resources. Many enterprises including from big to very small enterprises are willing to store and access services in cloud computing. As all work can be done easily without much burden, many users are willing and using services provided by cloud. Cloud computing provides storage facility, fast computing facility by doing computations parallel in distributed environment, reduces cost and burden of individuals. In this there are many advantages like storage, cost, computing in cloud but we can say a cloud computing is a good technology only if the services stored and accessed in cloud are secure, So security is the most challenging and important issue in cloud computing. We cannot use or just follow one strategy for resolving security issues in cloud computing as there are many security issues in cloud computing and these issues must be first analyzed, classified and should be solved by following different strategies. There are a lot of benefits with cloud computing but concentration should be on security issues while storing services in cloud by clients, accessing services by users, performing computations parallel in distributed environment and while using virtual machines in cloud. The main concerned security issues of today s market are people who are inheriting the private cloud thinks that there cloud are secure because they have built it inside it s firewall, but this is not the case it requires only bad apple to spoil the barrel. The second problem is companies lack security visibility and risk awareness. Of course it is a significant issue because lack of security visibility diminished inished the awareness of risk in a particular situation and also if the information is sensitive it needs a safer storage now the question is how safe that should totally depend on the data. Another problem with cloud security is there are a lot of apps coming in Copyright reserved by IJETR (Impact Factor: 0.997) 62

2 the market everyday as per the user requirement but they are not safe enough towards attacks and when we come to authentication and authorization, it should be more robust like every company should verify that whether the system works in the most secure and reliable way. These are the main security issues that we are facing now days. A lot of techniques are discussed here like divide and conquer at virtualization level. But we haven t achieved the security nirvana yet. So here we are proposing a new strategy which is based on the mechanism of security under human supervision. Our basic assumption is that whenever a system is facing a cyber attack it should act in its most normal way or we can say we are developing an agent based security system. This agent based security system supervises the network security system like a human monitoring system. Here some security issues are analyzed. Many users from different places involve in performing computations in cloud computing, the users will all share data, perform computations in parallel and aggregate result. While sharing data and performing computations parallel, users may leak data or values of computation or can do some malfunctions and by this the final result will be wrong. This is the one big security issue in cloud computing because of distrusted people. Cloud computing provide great storage facility but there are many security issues while storing data in cloud. If data we store is less, it can be managed easily but in cloud computing very large or vast amount of data is stored it is very difficult to manage this vast data, so data is stored in multiple layers in cloud. The user data that is stored in cloud must be confidential but it can be leaked by some users or attackers causing privacy issue for user data which is very dangerous. Data which is frequently used is stored in higher layers i.e. secure layers and data which is not frequently used is stored in lower layers i.e. insecure layers. But the data that is not frequently used contains some important information which can accessed easily by attackers as it is stored in lower layers where security is not that much provided. If the data is not stored properly in secured way unauthenticated or unauthorized people will access the information and create many problems.so all these storage issues should be solved by implementing appropriate techniques. Virtualization is one of the most important concept in cloud computing. The users can use the virtual machines and due to this virtualization many security problems like cross-vm attacks, data leaks and much vulnerability can be occurred and this security issued must be solved. As we mostly use NoSQL database in cloud computing more security problems will arise while using NoSQL database than using normal RDBMS and this security issues by NoSQL database in cloud must be solved. Data privacy is very important security issues in cloud. For this proper authentication, authorization and encryption mechanism must be used which allows resolving unnecessary privacy issues in cloud computing. While any user want to access the service provided by a cloud first proper safe connection should be established and as huge network is involved in accessing resource in cloud by client, many network problems may arise and all these issues should be solved. If safety connection is established than proxy user may request the resources or services of cloud, so proper identification and authorization is need to access services of cloud. If the user or client is not accessing the cloud without any authentication than user may access resources or services that should not be accessed.this may cause leakage of important data or information that should not viewed by users, which is a security problem for data stored in cloud, So all these security issues regarding storage of data in cloud must be solved. Copyright reserved by IJETR (Impact Factor: 0.997) 63

3 2. Literature Survey: In this we are perambulating some security issues that are existing in cloud like data privacy, data storage, parallel computing, NoSQL Databases issues etc and we percolated the solutions of different people for solving some security problems. Data Access and Privacy Issues: Cloud is very useful in providing services via internet, many users will access the services provided by cloud but among these users some may corrupt the data or leak the data or attack the resources of the cloud that access cloud through a network [3,6,7]. Because of this proper access control should be involved while user accessing the cloud. While accessing the services of cloud, first the client should request for the service and then safe connection should be established between client and front end server with the support of data security transfer module. After the connection establishment, the app server should identify and authorize the client by receiving the client request. After users identification and authorization of the client relevant application program is used by app server to process the request under the restriction of sandbox isolation module. This sandbox isolation module is useful for protecting applications confidentiality and integrity that is deployed in platform. If in the memory cache data is stored, app server uses the data directly otherwise data is obtained from the data memory securely with the help of data security storage module. Relevant HTML page is submitted to the user by processing the data collected by app server. If any abnormal situation occurs during the above process log audit module is helpful in sending alert messages and perform preventive measures by continuously monitoring. For the data that is kept by client in the cloud to be secure both at cloud side provider and client side, key management should be done and also intrusion detection and intrusion prevention must be deployed by the server logs. For avoidance of information leakage at client and service provider must use shared key [4]. Users who want to access data must be authenticated by not only user id and password but also digital ids, Policy based framework and XACML access control languages should be used for control access of data to provide security [5]. For data security a fully homomorphism encryption method is implemented by using IBM and without decryption data can be processed in this scheme. To provide data security effectively encryption methods like key-based encryption and lazy re-encryption can be used combined [8]. A cryptographic approach called cloud HKA can be used for access control in cloud computing which provides data security [9] Data Storage Issues: In cloud computing through multiple tier storage media data and transaction logs are stored. Even data is moving between tiers the IT manager can control what, where and when data is moved. But in cloud computing as the data size exponentially grows and to manage the data, auto-tiring is used for big data storage and auto-tiring imposes new challenges to security issues in data storage as information about data where the data is stored is not maintained in auto-tiring. In auto-tier system the data which is frequently used is kept in upper layers which are secure and the data which is not frequently used is kept in lower layer which is insecure layer. Even though lower layers data is not frequently used, it may consist of significant information. The significant information that is in lower layer is insecure because lower layer is provided with low security. Similarly confidentiality, integrity, provenance, consistency, Copyright reserved by IJETR (Impact Factor: 0.997) 64

4 collusion attacks, rollback attacks, disputes are all possible attacks in auto-tier storage system [16,7 ]. To store data securely in private cloud security layer is used which is in between session layer and transport layer. So at the server end by using some authentication protocols data is secured if client transfers data. A security algorithm is used when client want keep data in the cloud based on the document privacy level. Strong security algorithm can be used if it wants more security. The security server will save the document in the database by providing security [17]. Another architecture which is having XACML policy builder and evaluator can be used for secure storage of data [18]. As third party is involved in storing and accessing the services provided by cloud between client and cloud service provider RSA algorithm can be used for data security where client can encrypt and decrypt and SHA-512 can be used to create message digest [19]. Open CA public key Infrastructure, data partitioning approach, public audit ability can be implemented which potentially increases security in storing data in cloud [22, 21] Issues in Computations of Cloud Computing: As cloud computing is a distributed environment, distributed parallel computations are performed for storing data and this data which can be used by users [15]. Malfunctioning compute worker nodes, infrastructure attacks, rouge data nodes all these comes to security issues in the parallel computation of cloud computing distributed environment. For example consider a map reduce framework which is used in cloud computing where we map divide the computations to the mappers. In the first step the mappers produce key or value. In the second step, the reducers collect the values, produced by mappers and combine them by outputting the result [10,11,12]. But because of faulty node in network or incorrect ion configuration the workers could malfunction or leak the data. The worker who malfunctions will give wrong values finally when values are aggregated. The users profile can be modified or can be leaked by the workers. The worker may compromise and tap the information of the other workers and leak the information which may create malfunction the computations. Some data nodes in network receive replicate data and may also deliver the data by altering which finally gives wrong result when data is aggregated [20]. All these above issues are security issues in performing computations in cloud computing. This security issues can be solved in two ways i.e. by ensuring trust worthiness of workers and despite of the distrusted workers securing the data [13]. The trust worthiness of employees can be ensured by either trust establishment or mandatory access control. Trust can be established by authenticating the workers by the master and after the initial authentication the workers are checked periodically. By a predefined security policy Mac Account ensures access to the files but Mac cannot prevent data leakage from the mapper so data-de identification techniques used and it is the notion of differential privacy [14]. 2.4 NoSql Database Issues: NoSql databases are mostly used in cloud computing which used in cloud computing which we is good for analyzing data but security becomes a major problem in NoSql databases than RDBMS. Application developers have to be aware of security vulnerabilities when using NoSql data stores. Illegal access to data, weak authentication, insecure communication, Insufficient and ineffective input validations are vulnerabilities that should be aware while using NoSql data base[2]. Sometimes the ACID properties of RDBMS are also not satisfied and should be notified by all these issues when using NoSql databases. In RDBMS Virtual private database provides built in security but there is no tool found for providing security for NoSql databases, however creating new namespace can be used to offer Copyright reserved by IJETR (Impact Factor: 0.997) 65

5 security in the NoSql world. Authentication acess control and authorization can be supported in NoSql databases by using middle software. The JAAS framework, Apache Shiro framework, J2EE framework can provide security. Additionally HTTP as a transport in NoSql clusters can provide security in the middle way by validating on proxy servers as well as load-balancers. The current best approach is at the middle ware level we need to place security. For security purpose porting Hadoop to windows and to cloud Azure are been intended by Microsoft. 2.5Multi cloud Data Base Model for Security: Multi cloud data base model provides data security effectively than using single cloud service provider[1]. In multi cloud data base model user interface, HTTP server, Servlet engine, Data source (DBMS) and Cloud Service Providers with data storage are used for storing and managing data securely. The client can send a query via user interface and through HTTP request to web browser. HTTP Server plays vital role in managing communication between the application and browser. Through an application request HTTP Server user will send query to Servlet engine. Communication between Servlet engine and Data Source (DBMS) can be done via JDBC protocol. When query is passed to DBMS, DBMS process the query and collect the data from different data stores of cloud service providers. The result is passed back to HTTP Server when servlet engine is return with result to DBMS and then the user interface get result from HTTP Server. In this model there is data flow between DBMS and multi cloud provider where the DBMS store the data in each cloud service providers by dividing data into shares. If the client wants to store data in cloud DBMS generates a random polynomial function so that the data can be hidden from the distrusted user. Whenever query is arrived at the data source then data source rewrites the query for each cloud service provider and from each cloud service provider, data store relevant share is retrieved. This is secret sharing method in multi cloud service provider model which gives better security in storing and accessing data than single cloud service[1]. 3. Proposed Work: We are working here on developing a self healing cloud security system. Generally cyber attack causes the close down of the whole system whether it is a personalized computer, a business enterprise, a company or a cloud framework which is actually fatal. So here our aim is to build a smart, self handling and self healing cloud computing infrastructure which can actually work under a cyber attack. Now we will see how the system works. The system monitors the cloud computing infrastructure in normal situations and then maintains a graph in each in every situation with respect to the load. Then it calculates how the system should look and function under normal situations. Fig no 1 Graph Database Copyright reserved by IJETR (Impact Factor: 0.997) 66

6 This system proposes a model which tries to conserve the cloud infrastructure in the case of cyber attack. The portion which has been attacked only that will crash, rest of the system will work as naturally as it can. Generally human intervention is necessary for monitoring the performance of a system that s why we call it an agent based security system. Just like human body can interpret whether the system is working normally or not, this system helps the cloud infrastructure to work properly and preserve the system. Whenever a malicious attack happens the system recognizes by seeing the graph that something out of ordinary has happened and it tries to keep the system in normal mode as far as possible. 4. Design and architecture: The proposed architecture as we have already discussed works on the principle of human monitoring system. Where cloud is safe, we are not touching the cloud infrastructure we are just attaching an additional system which will observe, analyze and maintain the performance of the system. The architecture for the discussed process is given below. Fig no. 2 Proposed Architecture Here we can see that the system observes the performance of cloud infrastructure and construct a table and converts the data from tabular form to graph data and maintain a graph database and whenever a cyber attack is happened, it tries to keep the performance as according to the graph. In short it tries to keep the cloud performance as normal as possible. 5. Conclusion and Future Work: Cloud security gained attention now days because of the increasing usage of cloud computing in various areas. A lot of models have been proposed for increasing the security and developing the trust. But those were not suitable in Copyright reserved by IJETR (Impact Factor: 0.997) 67

7 the new generation of cloud computing as well as in the new generation of cyber attacks. So here we proposed a model which will keep the system trusted and in normal working pace. This system can also been further enhanced in multi cloud. This application can be used in health management, business management and E-commerce. References: [1] Ben Soh, Eric Pardede, Mohammed A. AlZain: MCDB: Using Multi-Clouds to Ensure Security in Cloud Computing, 2011 Ninth IEEE International Conference on Dependable Autonomic and Secure computing. [2] Xu Xiaoping, Yan Junhu: Research on Cloud Computing Security Platform, 2012 Fourth International Conference on Computational and Information Science. [3] Mike Hogan: Database Virtualization and the Cloud, Cloud databases, white paper December [4] Hyo-Jin Shin, Young-Hwan Bang, Young-Gi Min: Cloud Computing Security Issues and Access Control Solution, Journal of Security Engineering,2012. [5] Lokendra Singh Umrao, Subhash Chandra Patel, Dr. Ravi Shankar Singh : Policy-based Framework for Access Control in Cloud Computing,International Conference on Recent Trends in Engineering & Technology (ICRTET2012). [6] Deyan Chen, Hong Zhao: Data Security and Privacy Protection Issues in Cloud Computing, 2012 International Conference on Computer Science and Electronics Engineering. [7] UttamThakore: Survey of Security Issues in Cloud Computing, University of Florid, Journal of Undergraduate Research. [8] Cong Wang, KuiRen, Shucheng Yu and Wenjing Lou: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. [9] Cheng-Kang Chu2, Jianying Zhou, Wen-Guey Tzeng3 and Yi-Ruei Chen1: CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing,11 th International conference on cryptography and network security. [10] Yang Xiao and ZhifengXiao: Accountable Map Reduce in Cloud Computing, The first international conference on security in computers, networking and communication. [11] Ahmed bendahmane, Ahmed el moussaoui, Ali youne Mohammad essaaidi: A New Mechanism to Ensure Integrity for MapReduce in Cloud Computing. [12] Ahmed bendahmane, Ahmed el moussaoui, Ali youne Mohammad essaaidi: Result Verification Mechanism for Map Reduce Computation Integrity in Cloud Computing,IEEE [13] Jing Deng, Julia H. Deng, Scott C.-H. Huang, Yunghsiang S. Han: Fault-Tolerant and Reliable Computation in Cloud Computing, IEEE Globecom 2010 Workshop on Web and Pervasive Security. Copyright reserved by IJETR (Impact Factor: 0.997) 68

8 [14] Cong Wang, Jia Wang, KuiRen: Secure and Practical Outsourcing of Linear Programming in Cloud Computing, IEEE TRANSACTIONS ON CLOUD COMPUTING April 10-15, [15] SashankDara: Cryptography Challenges for Computational Privacy in Public. [16] Compuqup technologies : Cloud Storage The Issues and Benefits, white paper. [17] PradnyeshBhisikar: Security in Data Storage and Transmission in Cloud Computing, International Journal of Advanced Research in Computer Science and Software Engineering. [18] Anuj Gupta, BhavaniThuraisingham, LatifurKhan,, Murat Kantarcioglu, Vaibhav Khadilkar,: Secure Data Storage and Retrieval in the Cloud. [19] AbhishekMohta, Lalit Kumar Awasthi, Ravi Kant Sahu: Robust Data Security for Cloud while using Third Party Auditor, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 2, February [20] G.Sireesha, P.Radha Krishna Reddy, S.Pavan Kumar Reddy and U.Seshadri: The Security Issues of Cloud Computing Over Normal & IT Sector, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 3, March [21] FarokhBastani, I-Ling Yen, Liangliang Xiao, Yunqi Ye: Cloud Storage Design Based on Hybrid of Replication and Data Partitioning, th international conference on Parallel and Distributed Systems. [22] Cong Wang, Jin Li, KuiRen, Qian Wang, Wenjing Lou : Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions On Parallel And Distributed Systems, VOL. 22, NO. 5, MAY Copyright reserved by IJETR (Impact Factor: 0.997) 69

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.

More information

IMPLEMENTING DATA SECURITY IN MULTI CLOUD

IMPLEMENTING DATA SECURITY IN MULTI CLOUD IMPLEMENTING DATA SECURITY IN MULTI CLOUD Ms. Renu Nagendra Shinde Information Technology SKNCOE Pune 41,India renunikhilp@gmail.com Prof. Mrs. Varsha Khandekar Information Technology SKNCOE Pune 41, India

More information

Privacy preserving technique to secure cloud

Privacy preserving technique to secure cloud Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India vitthalgutte2014@gmail.com Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Ashish G. Ahuja 1, Prof. Komal B. Bijwe 2 1. M.E. Scholar, Dept Of CSE 2. Asst. Prof. Dept. Of CSE at P.R.P.C.E& M, Amravati

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

A SURVEY ON DATA SECURITY IN CLOUD COMPUTING: ISSUES AND MITIGATION TECHNIQUES

A SURVEY ON DATA SECURITY IN CLOUD COMPUTING: ISSUES AND MITIGATION TECHNIQUES A SURVEY ON DATA SECURITY IN CLOUD COMPUTING: ISSUES AND MITIGATION TECHNIQUES Satarupa Biswas 1, Abhishek Majumder 2 1 Department of Computer Science and Engineering, Tripura University 2 Department of

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

A Security Integrated Data Storage Model for Cloud Environment

A Security Integrated Data Storage Model for Cloud Environment Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Secure Privacy Preserving Public Auditing for Cloud storage

Secure Privacy Preserving Public Auditing for Cloud storage Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

Research Paper on Data Integrity Checking In Cloud Computing

Research Paper on Data Integrity Checking In Cloud Computing Research Paper on Data Integrity Checking In Cloud Computing Indu Bala 1, Savita Bishnoi 2 1 Department of Computer Science & Engineering, Rohtak Institute of Engineering& Management Rohtak, Haryana, India

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

Cloud Data Protection for the Masses

Cloud Data Protection for the Masses Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Secure Authentication of Distributed Networks by Single Sign-On Mechanism Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 soniaarora141@gmail.com, 2 pawanluthra81@gmail.com

More information

How To Ensure Data Integrity In Cloud Computing

How To Ensure Data Integrity In Cloud Computing A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

A survey on cost effective multi-cloud storage in cloud computing

A survey on cost effective multi-cloud storage in cloud computing A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of

More information

Data Security in Cloud Using Elliptic Curve Crytography

Data Security in Cloud Using Elliptic Curve Crytography Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.

More information

Mutual Authentication Cloud Computing Platform based on TPM

Mutual Authentication Cloud Computing Platform based on TPM Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan

More information

Cloud Server Storage Security Using TPA

Cloud Server Storage Security Using TPA Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Cloud storage Security Mechanism with Authentication in Public Cloud

Cloud storage Security Mechanism with Authentication in Public Cloud Cloud storage Security Mechanism with Authentication in Public Cloud Apurva Patidar 1, Mohsin Sheikh 2 Department of Computer Science & Engg. Medicaps Institute Of technology and Management, Indore,(M.P.),India

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Secure Data Migration across Cloud System Using Third Party Auditor (TPA)

Secure Data Migration across Cloud System Using Third Party Auditor (TPA) Secure Data Migration across Cloud System Using Third Party Auditor (TPA) Shyamli Dewan 1, Devendra Kumar 2, Sandeep Gonnade 3 M.Tech. Scholar, School of Engineering & IT, MATS University, Raipur, Chhattisgarh,

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM

REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM International Journal of Computer Science and Engineering (IJCSE) ISSN(P): 2278-9960; ISSN(E): 2278-9979 Vol. 2, Issue 5, Nov 2013, 55-60 IASET REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM

More information

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant

More information

Secure Data Sharing in Cloud Computing using Hybrid cloud

Secure Data Sharing in Cloud Computing using Hybrid cloud International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)

EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) A.William Walls Research Scholar Department of Computer Science SSM College of Arts and Science Komarapalayam,

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Survey Paper on Integrity Auditing of Storage

Survey Paper on Integrity Auditing of Storage International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

A Layered Signcryption Model for Secure Cloud System Communication

A Layered Signcryption Model for Secure Cloud System Communication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 poojadhawan786@gmail.com ABSTRACT Cloud Computing

More information

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America 1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

SENSE Security overview 2014

SENSE Security overview 2014 SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Ensuring Data Storage Security in Cloud Crop

Ensuring Data Storage Security in Cloud Crop ISSN : 2347-8446 (Online) International Journal of Advanced Research in Ensuring Data Storage Security in Cloud Crop Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology,

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Fuzzy Keyword Search over Encrypted Stego in Cloud

Fuzzy Keyword Search over Encrypted Stego in Cloud International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Fuzzy Keyword Search over Encrypted Stego in Cloud TanmayDahake 1*, MirsohailShaikh

More information

Research on Storage Techniques in Cloud Computing

Research on Storage Techniques in Cloud Computing American Journal of Mobile Systems, Applications and Services Vol. 1, No. 1, 2015, pp. 59-63 http://www.aiscience.org/journal/ajmsas Research on Storage Techniques in Cloud Computing Dapeng Song *, Lei

More information

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA).

Keywords: Cloud Storage, Shared Data, Privacy Preserving, Secret Sharing, Authentication, Third Party Auditor(TPA). Volume 5, Issue 4, April 215 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Security in

More information

Achta's IBAN Validation API Service Overview (achta.com)

Achta's IBAN Validation API Service Overview (achta.com) Tel: 00 353 (0) 14773295 e: info@achta.com Achta's IBAN Validation API Service Overview (achta.com) Summary At Achta we have built a secure, scalable and cloud based API for SEPA. One of our core offerings

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur

More information

Cloud Computing Security Issues and Controls

Cloud Computing Security Issues and Controls Cloud Computing Security Issues and Controls ACC 626 Information System Assurance & Computer-Assisted Auditing Peter Shih-Hsien Chen June 30th, 2013 Table of Contents Introduction... 1 History of Cloud

More information

Big Data Security Challenges and Recommendations

Big Data Security Challenges and Recommendations International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-1 E-ISSN: 2347-2693 Big Data Security Challenges and Recommendations Renu Bhandari 1, Vaibhav Hans 2*

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, jpav23@gmail.com) 2 (Asst. Professor, MRIT, Hyderabad, India, a.naveen21@gmail.com)

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud

Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud 680 Hybrid Cryptographic Framework for Multimedia Data Storage over Cloud 1 Ramandeep Kaur, 2 Gurjot Kaur 1 Department of Computer Engineering Chandigarh University, Gharuan 2 Assistant Professor, Department

More information

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,

More information

A Secure and Dependable Cloud Storage Service in Cloud Computing

A Secure and Dependable Cloud Storage Service in Cloud Computing A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model

More information

A Secure Authenticate Framework for Cloud Computing Environment

A Secure Authenticate Framework for Cloud Computing Environment A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure

More information