Algorithmic Approach To Cloud Data Security
DOI:
https://doi.org/10.26438/ijcse/v6i4.194199Keywords:
Cloud Computing, Data Security, CSP(Cloud Service Provider), AES(Advanced Encryption Standard), Data theft, Breach level index, DoS, DDos, CIA(Confidentiality, Integrity, Availability)Abstract
Cloud Computing is taking popularity day by day in a various organization as it provides giant and scalable space for public and private use. Cloud computing is now widely used by many of the organization as a service. With the increase in the usage of the cloud, there also increases the concerns of cloud security. Somehow many organizations are hesitating to keep their data in the cloud due to security concerns. This paper understands various security issues related to cloud and resolves the data security issues, based on our proposed framework. Proposed framework is based on securing the various types of data like text, image and videos by applying Encryption Algorithms which reduces the various security issues and loopholes and thus making it more secure. It prevents the data from unauthorized access and also maintains the CIA (Confindentiality , Integrity, Availability). The paper proves to be providing the security in least time.
References
V. Chang , M. Ramachandran ,“Towards achieving data security with the cloud computing adoption framework”, IEEE Trans. Serv. Comput. 9 (1) (2016) pp. 138–151.
K. Gai , M. Qiu , L. Chen , M. Liu, “Electronic health record error prevention approach” using ontology in big data”, 17th IEEE International Conference on High Performance Computing and Communications, New York, USA, 2015, pp. 752–757
K. Gai , L. Qiu , H. Zhao , M. Qiu ,“Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing”, IEEE Trans. Cloud Computing. 1 (2016) pp. 99
M. Rajasekhar Reddy, Akilandeswari R, S. Priyadarshini, B. Karthikeyan, E. Ponmani “ A Modified Cryptographic Approach For Securing Distributed Data Storage in Cloud Computing” 2017 International Conference on Networks & Advances in Computational Technologies (NetACT) |20-22 July 2017| Trivandrum
Akanksha Bansal , Arun Agrawal “Providing Security ,Integrity and Authentication Using ECC Algorithm in cloud storage” 2017 International Conference on Computer Communication and Informatics (ICCCI -2017), Jan. 05 – 07, 2017, Coimbatore, INDIA
Dr. P. Raviraj, Angeline Lydia, Dr. M.Y. Sanavullah “An Accurate Image Segmentation Using Region Splitting Technique” GESJ: Computer Science and Telecommunications 2011|No.2 (31) pp. 16-18 10 June 2010.
Ajay Kulkarni, Saurabh Kulkarni, Ketki Haridas, Aniket More “Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study” International Journal of Computer Applications (0975 – 8887) Volume 65– No.1, pp. 3-5 March 2013.
Jolly Shah and Dr. Vikas Saxena” Video Encryption: A Survey” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, pp. 5-8 March 2011
Mohit Kumar, Akshat Aggarwal, Ankit Garg “A Review On Digital Image Encryption Techniques and Security Criteria” International Journal of Computer Applications (0975 – 8887) Volume 96– No.13, pp. 4-8 June 2014
Mark Brinda, Michael Heric "The Changing Faces of the Cloud" Bain Global Technologies, Bain & Company, New York, pp. 5-12, 2017.
Anju Bala, Dr. Aman Kumar Sharma “Split and Merge: A Region Based Image Segmentation” ,International Journal of Emerging Research in Management & Technology ISSN: 2278-9359 (Volume-6, Issue-8), August 2017
Yunchuan Sun, Junsheng Zhang, Yongplng Xlong, Guangyu Zhu “Data Security and Privacy in Cloud Computing”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2014, Article ID 190903, 16 April 2016
S. Arul Oli , Dr. L. Arockiam “Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage”, 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET) pp. 3-5
Swapnil Rajesh Telrandhe, Deepak Kapgate “Authentication Model on Cloud Computing” International Journal of Computer Sciences and Engineering (IJCSE) Volume-2, Issue-10, pp. 33-37
Sajjan R.S., Vijay Ghorpade, Vishvajit Dalimbkar “A Survey Paper on Data security in Cloud Computing” ” International Journal of Computer Sciences and Engineering (IJCSE) Volume-4, Special Issue-4
Dr. Prerna Mahajan, Abhishek Sachdeva, “A Study of Encryption Algorithms AES, DES and RSA for Security” Global Journal Of Computer Science And Technology Network, Web & Security, Volume 13 Issue 15 Version 1.0 Year 2013, Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350, pp. 7-8
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
