Ensuring Security to Data on Cloud using Cryptography
2016, International Journal Of Engineering And Computer Science
https://doi.org/10.18535/IJECS/V5I9.58Abstract
As the information created by the ventures that should be put away and used (e.g. messages, individual wellbeing records, photograph collections, charge reports, budgetary exchanges and so on) is quickly expanding information proprietors are inspired to outsourced their nearby complex information administration frameworks into the cloud for its extraordinary adaptability and monetary reserve funds. Distributed storage permits shoppers and organizations to utilize the application without establishment and access their own records at any PC with web access. In distributed storage, the information will be put away given by cloud administration suppliers (CSPs). Cloud administration suppliers must have a reasonable approach to ensure their customers information. In any case, in information security assurance and information recovery control is most testing exploration work in distributed computing. This paper basically concentrates on center secured distributed storage administrations i.e by encrypting the information it can store the data in securely.
References (11)
- Web Search for A Planet: The Google Cluster Architecture. Retrieved April 6, 2011, available at: http://labs.google.com/papers/googlecluster- ieee.pdf
- R. Rivest, L. Adleman, and M. Dertouzos. On datbanks and privacy homomorphisms. In Foundations oSecure Computation, pp. 169-180, 1978.
- R. Rivest, A. Shamir, and L. Adleman. A method foobtaining digital signatures and public-key cryptosystems In Comm. of the ACM, 21:2, pages 120-126, 1978
- James Mark Kelly,Columbus state University CPSC 6128 Spring 2010-Cloud computing and cryptography
- Seny Kamara and Kristin Lauter, "Cryptographic Cloud Storage, in Proceedings of Financial Cryptography": Workshop on Real-Life Cryptographic Protocols and Standardization 2010, January 2010.
- Hugo A.W.Ideler "Cryptography as a service in a cloud computing environment" Master Thesis( Eindhoven University Of Technology Department Of Mathematics And Computing Science)
- John K. Waters. 2010. Cryptographers Warn About Security Danagers in the Cloud at RSA. In Application Development Trends. March 09, 2010. http://adtmag.com/articles/2010/03/09/cryptog raphers-security-danagers-cloud-rsa.aspx.
- Security Issues in Cloud Computing: The Potentials of Homomorphic Encrypt Aderemi A. Atayero,Oluwaseyi Feyisetan-Journal of Emerging Trends in Computing and Information Sciences IT Cloud Services User Survey, pt.2: Top Benefits & Challenges. Retrieved April 8, 2011 from http://blogs.idc.com/ie/?p=210
- New IDC IT Cloud Services Survey: Top Benefits and Challenges. Retrieved April 8, 2011 from http://blogs.idc.com/ie/?p=730
- Catteddu, D. and Hogben, G." Cloud Computing: benefits, risks and recommendations for information security." Technical Report. European Network and Information Security Agency, 2009.
- "Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives. White Paper.Information"