A Survey Paper on Data security in Cloud Computing
Keywords:
component, Cloud computing, Data Security, Encryption AlgorithmAbstract
Cloud computing is group of services for example software system storage, network and hardware these type of services are provided to user. Cloud storage is easily access anywhere anytime of the data because cloud is work in remote location. It uses the storage service provided by the cloud provider. Data is not secure in the cloud because the unauthorized user can try to use of the private data. So providing the data security it uses the different encryption method to protect the data. So that in the proposed study it use the multilevel encryption algorithm. In the multilevel encryption it combines two different algorithms for providing the better security.
References
P. Mell and T. Grance, The NIST Definition of Cloud Computing, version 15, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov).
Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (83-85), Jul -2014, E-ISSN: 2347-2693
Sandha, M.Ganaga Durga,” Study on Data Security Mechanism in Cloud Computing”,IEEE conference no-33344.
William Stallings, Cryptography and Network Security: Principles and Practices, Fifth edition, Prentice Hall, ISBN-13: 978- 0136097044, 2010.
Balachandra Reddy Kandukuri, Rama Krishna Paturi and Dr. AtanuRakshit, “C loud security issues” In Services Computing, 2009. IEEE International Conference on, page 517520, 2009.
Neha Jain and Gurpreet Kaur ‘Implementing DES Algorithm in Cloud for Data Security” VSRD International Journal of CS & IT Vol. 2 Issue 4, pp. 316-321, 2012.
Amazon Web Services: Overview of Security Processes, may 2011.
L. M. Kaufman, "Data security in the world of cloud computing,"IEEE Security & Privacy Magazine, vol. 7, pp. 61-64, July2009.
P.Shanthi Bala,” Intensification of Educational Cloud Computing and Crisis of Data Security in Public Clouds”,IJCSE Vol. 02, No. 03, 2010, 741-745.
K Hashizume et al., An analysis of security issues for cloud computing, Journal of Internet Services and Applications, a Springer open journal, pp 1-13, 2013.
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka,and J. Molina. Controlling data in the cloud: Outsourcing computation without outsourcing control. pages 85–90, 2009
Wang, J.K.; Xinpei Jia, Data Security and Authentication in hybrid cloud computing model, Global High Tech Congress on Electronics (GHTCE), 2012 IEEE, On page(s): 117-120.
Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013.
K. Dubey, M. Namdev, S. Shrivastava, “Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment”, IEEE sixth international conference, 2012.
Prakash G. L , Dr. Manish Prateek, Dr Inder Singh, ,“Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques ”,IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
