International Journal of Advanced Research in Computer Science and Software Engineering
|
|
|
- Griffin Welch
- 9 years ago
- Views:
Transcription
1 Volume 3, Issue 3, March 2013 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Cloud Computing: Security Challenges & Encryption Practices Dr.A.Padmapriya, M.C.A., M.Phil., Ph.D P.Subhasri, (M.Phil, Research Scholar) * Department of Computer science and Engineering, Alagappa University, Karaikudi, INDIA Department of Computer science and Engineering, Alagappa University, Karaikudi, INDIA. Abstract Cloud is a new era of the modern world. Reasons for development of cloud are different people and different purpose depends upon the demand. The improvement of the cloud technology also increases the security issues twice. So we need to solve the security issues in the cloud technology. In this paper, we have discussed about cloud security mechanisms and presented the comparative study of several algorithms. In future we are going to propose a new plan to solve security issues for both cloud providers and cloud users. Keywords Cloud, Security, Encryption algorithms, Security issues I. INTRODUCTION Cloud is a broad solution that delivers IT as a service. Cloud is an internet based technology uses the internet & central remote servers to support data and applications. It permits consumers and businesses putting to use without installation and approach their personal files at any computer with internet access. Cloud also provided shared resources like electricity distributed on the electrical grid. Before cloud, websites and server based applications were executed on a specific system. The cloud flexibility is a function of the allocation of resources on authority s request. And the cloud provides the act of uniting. A cloud is a large pool [1], of easily and accessible virtualized resources, such as hardware, development platforms and/or services. These resources can be powerfully re-configured to arrange properly to a variable load scale, and also permitting for an optimum resource use. This pool of resources is constituting a type exploited by a pay-per-use model in which guarantees are hold out for acceptance by the infrastructure supply by means of usage Service-Level Agreements(SLA). In the cloud, the end user is just using a very light device which is capable of using a network that connects it to a server at some other location. The users do not need to store the data at its end as all the data is stored on the remote server at some other place. A cloud is a pattern of parallel and distributed system be composed of a collection of interconnected and virtualized computers that are dynamically stipulation and presented as one or more unite resources established on service level agreements found amongst negotiation between the service supplier and consumer. It uses remote services through a network using various resources. It is basically meant to give maximum with the minimum resources i.e. the user end is having the minimum hardware requirement but is using the maximum capability of. This is possible only through this technology which requires and utilizes its resources in the best way. The concept of cloud is linked closely with those of Information as a service (IaaS), Platform as a service (PaaS), Software as service (SaaS) all of which means a service-oriented architecture. Here comes the first benefit of the cloud i.e. it reduces cost of hardware that could have been used at user end. As there is no need to store data at user's end because it is already at some other location. So instead of buying the whole infrastructure required to run the processes and save bulk of data you are just renting the assets according to your requirement. The similar idea is behind all cloud networks [2]. II. SECURITY ISSUES IN CLOUD COMPUTING A. Security Issues: The cloud service provider for cloud makes sure that the customer does not face any problem such as loss of data or data theft. There is also a possibility where a malicious user [3] can penetrate the cloud by impersonating a legitimate user, there by infecting the entire cloud. This leads to affects many customers who are sharing the infected cloud. There are five types of issues [4] raise while discussing security of a cloud. 1. Data Issues 2. Privacy issues 3. Infected Application 4. Security issues 5. Trust Issues 2013, IJARCSSE All Rights Reserved Page 255
2 1. Data Issues: Whenever a data is on a cloud, anyone from anywhere anytime can access data from the cloud since data may be common, private and sensitive data in a cloud. So at the same time, many cloud service consumer and provider accesses and modify data. Data stealing is a one of serious issue [15] in a cloud environment. Many cloud service provider do not provide their own server instead they acquire server from other service providers due to it is cost affective and flexible for operation and cloud provider. So there is a much probability of data can be stolen from the external server. Data loss is a common problem in cloud. If the cloud service provider shut down his services due some financial or legal problem then there will be a loss of data for the user. Moreover, data can be lost or damage or corrupted due to miss happening, natural disaster, and fire. Solution: Data protection in cloud is very important factor it could be complicated for the cloud customer to efficiently check the behavior of the cloud supplier and as a result he is confident that data is handled. Also very efficient data integrity method [13] in cloud. 2. Privacy Issues: The cloud service provider must make sure that the customer personal information is well secured from other providers, customer and user. As most of the servers are external, the cloud service provider should make sure who is accessing the data and who is maintaining the server so that it enable the provider to protect the customer s personal information. Solution: Authentication [7] is a best solution for the privacy issue. Authentication and access control are more important than ever since the cloud and all of its data are accessible to anyone over the Internet. 3. Infected Application: Any malicious user from uploading any infected application onto the cloud which will severely affect the customer and cloud service. Solution: To prevent [8] cloud service provider should have the complete access to the server with all rights for the purpose of monitoring and maintenance of server. 4. Security issues: Cloud security must be done on two levels. One is on provider level and another is on user level. The user should make sure that there should not be any loss of data or stealing or tampering of data for other users who are using the same cloud due to its action. Solution: Cloud service provider should make sure that the server is well secured [17] from all the external threats it may come across. Even though the cloud service provider has provided a good security layer for the customer and user. A cloud is good only when there is a good security provided by the service provider to the user. 5. Trust Issues: Trust is very necessary aspect in business. Still cloud is failed to make trust between customer and provider. So the vendor uses this marvelous application should make trust. Weak trust relationship and lack of customer trust cause many problems during deployment of cloud services. B. Cloud Services: Cloud provides different services rather than a unit of product. The basic six types[6] of the services are as follows, Web based cloud services: These services exploit certain web service functionality, rather than using fully developed applications. (i.e.) it includes an application programming interchange for Google maps, and also the payroll or credit card processing. Saas (software as a service): It is one of the ideas to providing a given application to multiple tenants, typically using the browser saas solutions are common in sales, HR and ERP. Paas (Platform as a service): This is different types of saas. You run your own application but you do it on the cloud provider s infrastructure. Utility cloud services: There are virtual storage and server options that organizations can access on demand, even allowing the creation of a virtual data centre. Managed services: This is maybe the oldest iteration of cloud solutions. In this concept, a cloud provider utilizes an application rather than end users. (i.e.) Anti-spam services or even application monitoring services. Service commerce: These types of cloud solutions are a mix of saas and managed services. Common implementations include expense tracking, travel ordering or even virtual assistant services. C. Current Trends in Cloud Security: Prince jain [14] have proposed the parameters that affect the security of the cloud then it explores the cloud security issues and problems faced by cloud service provider and cloud service consumer such as data, privacy, and infected application and security issues. It also provides tips for tackling these issues and problems such as Control the consumer access devices, Monitor the Data Access, Share demanded records and verify the data deletion, Security check events. F.A.Alvi et al [5] reviewed the security privacy & trust issues of cloud. They have proposed some surveys conducted by IDC that show the motivation for the adoption of cloud. Also identifies the issues and the solution to overcome these problems. It also contain the security model named security access control services SACS is analyzed through the Hadoop map reduce framework and the experimental results are obtained that compare the system performance with SACS model and without SACS model. Once the attack starts up, the performance which using security model is better than not using one. So the cloud with the proposed security model has the more stable 2013, IJARCSSE All Rights Reserved Page 256
3 performance when facing the attack threat, especially a variety of stacks at the same time. Mandeep kaur and Manish mahajan [9] reviewed the Encryption Algorithms to enhance the Data Security in Cloud Computing. They have proposed to access a cloud based web application that will try to eliminate the concerns regarding data privacy; segregation. They also suggested different encryption algorithms like - AES, DES, RSA and Blowfish to ensure the security of data in cloud. They also stated that the research will be conducted using Java runtime of Google App Engine, i.e. JDK 1.6,Eclipse IDE,Google App Engine SDK or higher. Sara Qaisar and Kausar Fiaz Khawaja [16] proposed Network/Security Threats and Counter Measures for cloud. Cloud improves organizations performance by utilizing minimum resources and management support, with a shared network, valuable resources, bandwidth, software s and hardware s in a cost effective manner and limited service provider dealings. Basically it s a new concept of providing virtualized resources to the consumers. Consumers can request a cloud for services, applications, solutions and can store large amount of data from different location. But due to constantly increase in the popularity of cloud there is an ever growing risk of security becoming a main and top issue. This paper is going to present the comparative study of implementing encryption algorithm for securing the cloud. III. ENCRYPTION METHODS FOR DATA SECURITY IN CLOUD Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private Key encryption to hide the sensitive data of users, and cipher text retrieval. The following three papers analyze the feasibility of the applying encryption algorithm for data security and privacy in cloud Storage Implementing DES Algorithm in Cloud for Data Security Neha Jain and Gurpreet Kaur [11] described Data security system implemented into cloud using DES algorithm. This Cipher Block Chaining system is to be secure for clients and server. The security architecture of the system is designed by using DES cipher block chaining, which eliminates the fraud that occurs today with stolen data. There is no danger of any data sent within the system being intercepted, and replaced. The system with encryption is acceptably secure, but that the level of encryption has to be stepped up, as power increases. The algorithm steps are follows. 1. Get the Plaintext. 2. Get the Password. 3. Convert the Characters into binary form. 4. Derive the Leaders (L1 to L16) from the Password. 5. Apply the Formula to get the encrypted and decrypted message. In order to secure the system the communication between modules is encrypted using symmetric key. Though many solutions have been proposed earlier many of them only consider one side of security; the author proposed that the cloud data security must be considered to analyze the data security risk, the data security requirements, deployment of security functions and the data security process through encryption. The main contribution of this paper is the new view of data security solution with encryption, which is the important and can be used as reference for designing the complete security solution Data Security in Cloud using RSA Algorithm Parsi Kalpana, Sudha Singaraju[12] have proposed a method by implementing RSA algorithm to ensure the security of data in cloud. RSA algorithm to encrypt the data to provide security so that only the concerned user can access it. The purpose of securing data, unauthorized access does not allow. User data is encrypted first and then it is stored in the Cloud. When required, user places a request for the data for the Cloud provider; Cloud provider authenticates the user and delivers the data. RSA is a block cipher, in which every message is mapped to an integer. RSA consists of Public-Key and Private-Key. In the proposed Cloud environment, Pubic-Key is known to all, whereas Private- Key is known only to the user who originally owns the data. Thus, encryption is done by the Cloud service provider and is done by the Cloud user or consumer. Once the data is encrypted with the Public-Key, it can be decrypted with the corresponding Private-Key only Homomorphic Encryption Applied to the Cloud Computing Security Maha TEBAA et al [10] have proposed an application of a method to execute operations on encrypted data without decrypting them which will provide the same results after calculations as if the authors have worked directly on the raw data. Homomorphic Encryption systems are used to perform operations on encrypted data without knowing the private key (without ), the client is the only holder of the secret key. When the author decrypts the result of any operation, it is the same as if they had carried out the calculation on the raw data. In this paper cloud security based on fully Homomorphic encryption, is a new concept of security which enables providing results of calculations on encrypted data without knowing the raw data on which the calculation was carried out, with respect of the data confidentiality. The author work is based on the application of fully Homomorphic encryption to the Cloud Computing security considering: The analyze and the improvement of the existing cryptosystems to allow servers to perform various operations requested by the client. The improvement of the complexity of the Homomorphic encryption algorithms and compare the response time of the requests to the length of the public key. IV. RESULTS AND DISCUSSIONS The comparison table considers the important cloud security characteristics such as, Key used 2013, IJARCSSE All Rights Reserved Page 257
4 Scalability Security Authentication type Comparison [19] among the RSA, Homomorphic encryption algorithms and DES, The Homomorphic encryption algorithm and DES are scalable but RSA is not scalable. The security [18], the DES is fully secured for both providers and client side but RSA security applied client side only likewise Homomorphic encryption algorithm security applied cloud itself only. The following table characteristic precedes the insecure issues. So we are using the effective authentication plan to provide stronger security for both cloud providers and consumers. TABLE 1 CHARACTERISTICS OF EXISTING ENCRYPTION ALGORITHMS Characteristics Algorithm Algorithm Encryption DES RSA Homomorphic Platform Cloud Cloud Cloud Keys Used Scalability Security applied to Authentica tion Type Same key is used for encryption and Purpose. It is scalable algorithm due to varying the key size and Block size. Both providers and client side Message authentication used Different keys are used for encryption and Purpose. Not scalable Client side only Robust authentication implemented private key is used(without ) scalable Cloud providers only Authentication never used V. CONCLUSION In Cloud technology there are a set of important policy issues, which include issues of privacy, security, anonymity, telecommunications capacity, government surveillance, reliability among others. But the most important between them is security and how cloud provider assures it. Generally, Cloud has several customers such as ordinary users, academia, and enterprises who have different motivation to move to cloud. If cloud clients are academia, security effect is on performance of and for them cloud provides a way to combine security and performance. For enterprises the most important problem is also security but with different vision. For them high performance may be not as critical as academia. So, as per the perspective of different users, the security point of view is different. This paper analyses the importance of security to cloud. We compared three algorithms namely Data Encryption Standard (DES), RSA, Homomorphic encryption for data security in cloud. They are compared based on four characters; key used scalability, security applied to, and authentication type. In future we are going to propose a backup plan to solve security issues in both cloud providers and cloud consumers. REFERENCES [1] Cloud principles, systems and applications NICK Antonopoulos [2] Cloud methodology, systems and applications lizhe wang, rajiv ranjan. [3] Gartner: Seven cloud- security risks InfoWorld [4] C.N. Höfer and G. Karagiannis, Cloud services: taxonomy and comparison, Internet Serv Appl (2011) [5] F.A.Alvi, B.S.Choudary, N.Jaferry, Review on cloud security issues & challenges, iaesjournal.com, vol (2) (2012). [6] Furht,B., and Escalante,A. (2010). Handbook of Cloud Computing. New York: Springer /private-cloud [7] Jagpal Singh,Krishnan lal and Dr.Anil kumar Shrotiya, Journal of Computer Science and Applications., ISSN Volume 4, Number 1 (2012), pp [8] Kevin Hamlen, Murat kantarcioglu, Latifur Khan and Bhavani Thurasingham, International Journal of Information Security and Privacy, 4(2), p.p(39-51), April-June [9] MANDEEP KAUR, MANISH MAHAJAN, using encryption algorithms to enhance the data security in cloud, International journal of communication and computer technologies, ISSN Number: [10] Maha TEBAA, Saïd EL HAJJI and Abdellatif EL GHAZI, Homomorphic Encryption Applied to the Cloud Computing Security, Proceedings of the World Congress on Engineering 2012 Vol 1 WCE 2012, July 4-6, 2012, London, U.K 2013, IJARCSSE All Rights Reserved Page 258
5 [11] Neha Jain and Gurpreet Kaur, Implementing DES Algorithm in Cloud for Data Security, VSRD-IJCSIT, Vol. 2 (4), 2012, [12] Parsi Kalpana, Sudha Singaraju, Data Security in Cloud Computing using RSA [15] -list-top-providers/ [13] Priyanka Arora, Arun Singh and Himanshu Tyagi, Evaluation and Comparison of Security Issues on Cloud Computing Environment, (WCSIT) ISSN: Vol. 2, No. 5, p.p ( ), [14] Prince jain, security issues and their solution in cloud, International journal of & business research, ISSN (online): [15] Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki and Sugata Sanyal, A Survey on Security Issues in Cloud Computing. IJRCCT, ISSN , Vol 1, Issue 4, September [16] Sara Qaisar and Kausar Fiaz Khawaja, CLOUD COMPUTING:NETWORK/SECURITY THREATS AND COUNTERMEASURES, ijcrb, JANUARY 2012 VOL 3, NO 9. [17] Security analysis of cloud :( [18] VAMSEE KRISHNA YARLAGADDA and SRIRAM RAMANUJAM, Data Security in Cloud Computing, Vol.2 (1), p.p (15-23) (2011). [19] Veerraju Gampala, Srilakshmi Inuganti and Satish Muppidi, Data Security in Cloud Computing with Elliptic Curve Cryptography, International Journal of Soft Computing and Engineering (IJSCE) ISSN: , Volume-2, Issue-3, July , IJARCSSE All Rights Reserved Page 259
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING
AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, [email protected]) 2 (Asst. Professor, MRIT, Hyderabad, India, [email protected])
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms
RESERCH RTIE PEN CCESS nalyzing ata Security for Cloud Computing Using Cryptographic lgorithms Gurpreet Kaur 1, Manish Mahajan 2 1 (epartment of Information technology, Chandigarh Engineering College,
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
A Fully Homomorphic Encryption Implementation on Cloud Computing
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 811-816 International Research Publications House http://www. irphouse.com A Fully Homomorphic
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Broker
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Implementing Cloud Data Security by Encryption using Rijndael Algorithm
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015
RESEARCH ARTICLE OPEN ACCESS A Survey on Cloud Computing Security and Solutions N. Sugavaneswaran, D.Saravanan Assistant Professor Department of Computer Science Srimad Andavan Arts and Science College
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
Application Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
Comprehensive Study on Data Security in Cloud Data Store
Int. J. Open Problems Compt. Math., Vol. 7, No. 4, December 2014 ISSN 1998-6262; Copyright ICSRS Publication, 2014 www.i-csrs.org Comprehensive Study on Data Security in Cloud Data Store Hisham A. Shehadeh,
Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services
International Journal of Recent Research and Review, Vol. IV, December 2012 ISSN 2277 8322 Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services Vidhi Agarwal 1,
Cloud storage Security Mechanism with Authentication in Public Cloud
Cloud storage Security Mechanism with Authentication in Public Cloud Apurva Patidar 1, Mohsin Sheikh 2 Department of Computer Science & Engg. Medicaps Institute Of technology and Management, Indore,(M.P.),India
Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud
Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud Amandeep Kaur 1, Sarpreet Singh 2 1 Research Fellow, 2 Asst. Professor 1,2 Sri Guru Granth Sahib World University,Fatehgarh
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Enhance data security of private cloud using encryption scheme with RBAC
Enhance data security of private cloud using encryption scheme with RBAC Dimpi Rani 1, Rajiv Kumar Ranjan 2 M.Tech (CSE) Student, Arni University, Indora, Kangra, India 1 Assistant Professor, Dept. of
An Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
Enterprise Resource Planning in Cloud Computing Bhakti C Thorat 1 Siddhesh P Patil 2 Prof.Anil Chhangani 3
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Enterprise Resource Planning in Cloud Computing Bhakti C Thorat 1 Siddhesh P Patil 2
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
CLOUD COMPUTING: ARCHITECTURE AND CONCEPT OF VIRTUALIZATION
CLOUD COMPUTING: ARCHITECTURE AND CONCEPT OF VIRTUALIZATION Neha Roy 1, Rishabh Jain 2 1 PG Scholar, Masters of Technology, Galgotias College of Engineering and Technology, Greater Noida (India) 2 Assistant
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY
MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY Yogita Gangboir 1, Praveen Shende 2 1.,2 CSE Dept, CSIT Durg, (India) ABSTRACT Cloud computing is rising day by day around
STUDY AND COMPARISON OF CRYPTOGRAPHIC METHODS FOR CLOUD SECURITY
International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN(P): 2249-6831; ISSN(E): 2249-7943 Vol. 4, Issue 2, Apr 2014, 205-212 TJPRC Pvt. Ltd. STUDY AND
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 [email protected]
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
CLOUD COMPUTING: SECURITY ISSUES AND SECURITY MEASURES
CLOUD COMPUTING: SECURITY ISSUES AND SECURITY MEASURES Disha Bhatnagar 1, Rajkumar Singh Rathore 2 1 PG Scholar, Masters of Technology, Galgotias College of Engineering and Technology, Greater Noida (India)
Data Security in Cloud
Data Security in Cloud Mr. Pankaj Sareen Assistant Professor, Department of Computer Applications SPN College, Mukerian, Punjab [email protected] Dr. Tripat Deep Singh Assistant Professor, Department
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
CLOUD COMPUTING: SECURITY RISKS AND ITS FUTURE
CLOUD COMPUTING: SECURITY RISKS AND ITS FUTURE Neetika Karwasra 1, Mukesh Sharma 2 Computer Engineering Department, The Technology Institute of Textile and Sciences 1, 2 Bhiwani (Haryana) 1 [email protected],
Strong Encryption for Public Key Management through SSL
Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Homomorphic Encryption Method Applied to Cloud Computing
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1519-1530 International Research Publications House http://www. irphouse.com Homomorphic Encryption
Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem
Data Security in Cloud Storage and Computing Using the Schmidt-Samoa Public Key Encryption Cryptosystem Vyas S Department Of Computer Science and Engineering Panimalar Engineering College Chennai, India
The Private Cloud Your Controlled Access Infrastructure
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
IJOART. 1. Introduction. 2. Evolution of Cloud Services
International Journal of Advancements in Research & Technology, Volume 4, Issue 2, February -2015 81 An analysis of Security Attacks on Cloud wrt SaaS Ms. Shaheen Ayyub, Mr. Praveen Kaushik Research Scholar
A Review: Data Security Approach in Cloud computing by using RSA Algorithm
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Review:
