Ensuring Data Security on Cloud
2016
Sign up for access to the world's latest research
Abstract
Abstract: In cloud users data are stored on cloud servers. Storage servers are opaque to the users even users do not know the location of their data. Users have no means to securing their data on cloud. Users data are secured as per the providers policy and SLA. Users need some means to ensure security of their data on cloud. In this paper, I proposed cryptographic techniques that ensures users data security on cloud.
Related papers
Indo-Iranian Journal of Scientific Research (IIJSR), 2019
Cloud computing is a computer platform that enables users to pool information such as infrastructure, programs, services, and workflows. The cloud is a virtual pool of computational resources. It makes available computer resources in a group to consumers via the network. Cloud computing, as a new computer architecture, intends to openly share a memory, processing, and applications across a large number of clients. Current cloud computing systems have significant limitations in terms of ensuring clients' information confidentially. Because clients' sensitive information is transported in plaintext form to distant workstations controlled and maintained by third-party telecommunications companies, the danger of unauthorized exposure of clients' confidential documents by telecommunications companies is rather significant. A number of methods exist for securing clients' information against external intruders. This paper elaborates on the most recent situation in the investigations of various security protocols for data protection in cloud-based infrastructures.
2021
Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-ofthe art deployment and research challenges. Due to security issues, information over the Internet is becoming important. We have suggested a method to protect critical file data. Cryptography algorithms are an efficient way to encrypt sensitive data. It is a retrieval and transmission system that is readable only by intended users. The low cost and data usability of cloud computing is advantageous. Cloud storage has many advantages at low cost and data connectivity through the Internet. Ensured cloud data protection is an important part of the cloud computing environment because customers often store sensitive information with cloud storage services but they are not secure services. So, it remains a challenge to exchange data in a safe way while storing data from an unc...
Cloud computing has helped in expanding the resources without using any new architecture, human effort or programs. Even though cloud computing helps to store a large amount of information, some of the important problems faced are data privacy, information security, software security, access control and virtualization security. Privacy has become a concern as the companies have adapted to move all the sensitive data to cloud and cloud companies should assure on the privacy of the organization's data. Organizations and users can use applications without configuration and view all documents on any wireless access device when cloud storage is implemented and such information will also be stored by the cloud service provider. This paper discusses about the AES encryption mechanism used in cloud computing as this is a modern secure cloud protection and safety technology that is implemented in the cloud platform in order to secure the stored data within the cloud.
2011
Cloud computing is a means by which highly scalable services can be consumed over Internet and network on rental basis. Various cloud service providers are offering different services over cloud environment. Many big investors like Amazon S3, EC2, Microsoft Azure, IBM Blue, are providing cloud environments. When data is stored over cloud, vendors hold a limitless possibility to access this data. Social engineering done by cloud vendors or their employees would lead to information leak or even substantial loss of data. Commonly used authentication mechanism guarantee that authenticated users can access their data, but they do not guarantee security of data from the cloud vendor. This paper emphasizes on improving existing authentication mechanism & implementing data security schemes to secure data from the Data Flow Cloud Server cloud vendor and other users of cloud.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.
International Journal of Engineering Development and Research, 2016
Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...
International Journal of Applied Information Systems, 2017
Storing of data in the cloud (Cloud Computing) offers an effective and quick way of granting access to ones information from a third party service provider, providing business expansion at a lesser cost. Cloud data storage systems provide means to store bigger data in storage servers . The data stored in the cloud are stored and accessed from the internet over a longer time, making data exposed to hackers to steal stored and transmitted data over the cloud environment, leading to data integrity loss and users of cloud data unhappy. This paper proposed a novel cryptographic techniques to enhance the security in cloud environment and reduce the time associated with cryptographic encryption to a minimum.
International Journal of Computer Applications, 2016
Sharing data using cloud computing can be a good solution to profit from reduced costs, scalability, flexibility and more advantages that user can get from the cloud infrastructure. But when the object shared consists of sensitive or personnel data, the security concerns increase. Problems related to the lack of data confidentiality and integrity represent the number one problem encountered in cloud infrastructure and that restrains users and a number of organizations to benefit from the cloud"s services. In this paper we discuss the requirements needed to secure data in cloud environment and we propose a new approach to enhance the security of the data shared in cloud storage. Our method is based on cryptographic models. It is confidential, flexible and it reduces time of computation by adopting simple and efficient key management process and encryption schemes.
World Academy of Research in Science and Engineering, 2019
This present research paper proposes the security is frequently referred to as a standout among the most unlimited issues in the cloud processing as distributed computing gives a helpful and huge measure of capacity information at extremely low and effective expense so searching for a legitimate wellbeing measures is basic. It is contended that the Cloud is proposed to deal with a lot of information, along these lines aggressors can be search for taking out the information as it includes different data's being put away. A many customers are surfing cloud for diverse purposes hence they need profoundly protected & persevering administrations. The developing of cloud is growing day by day which utilizes the additional level of protection and validation. We propose a basic information assurance model where information is encoded utilizing MD5 with RSA and Authenticated by Diffie-Hellman calculation prior to it is propelled in the cloud, therefore guaranteeing data privacy and security.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (8)
- Jianfeng Yang, Zhibin Chen,"Cloud Computing Research and Security Issues" in IEEE-2010
- Gurdeep Singh Bindra et. al. "Cloud Security:Analysis and Risk Management of VM Images", 978-4673- 2237-9/12 IEEE, 2012
- Virtualization and Cloud Computing: Security Threats to Evolving Data Centers, Trend Micro, 2012
- Da Xiao,"A Multiple-File Remote Data Checking for cloud storage", computers & security, Elsevier, 2011. H index: 43
- Khaled Salah," Analyzing the security of Windows 7 and Linux for cloud computing" computers & security, Elsevier, 2012. H index: 43
- Xin Dong et. al. "Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing" computers & security, Elsevier, 2013. H index: 43
- Louay Karadsheh, "Applying security policies and service level agreement to IaaS service model to enhance security and transition" computers & security, Elsevier, 2013. H index: 43
- Yuesheng Tan, "CC-VIT: Virtualization Intrusion Tolerance Based on Cloud Computing" in IEEE, 2010.