A Novel Approach of Cloud Security by Authentication in Cloud Computing Environment

Authors

  • Sardana V School of Information and Communication Technology, Gautam Buddha University, Greater Noida, India
  • Saxena N School of Information and Communication Technology, Gautam Buddha University, Greater Noida, India

DOI:

https://doi.org/10.26438/ijcse/v7i10.256257

Keywords:

cloud computing, authentication, security methods, networks, TS (Trusted System)

Abstract

Now a days Internet grows up rapidly. Anything depends on network. This internet provide huge services to the users like data transfer, uploading, downloading etc… some of network services also provide security too. But here data storage is major task, its highly impossible to store huge data in network. Now the new emerging technology is cloud computing, its improve the performance, scalability and low cost to implement. Its provides many services to clients. Like upload the data retrieve the data etc… many organizations are depends on this storage service. We can install the cloud private or public or both. But cloud computing suffer from unauthorized data access. Still there is no permanent solution. These paper main objects are a) Prevent from unauthorized access b) prevent unnecessary steps to access the cloud c) To apply some tasks on cloud.

References

[1] M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, On Technical Security Issues in Cloud Computing. IEEE, 2009.

[2] Greg Boss, Padma Malladi, Denis Quan, Linda Legregni, Harold Hall, “Cloud Computing”, http://www.ibm.com/developerswork/websp here/zones/hipods/library.html, October 2007, pp. 4-4

[3] “Wesam Dawoud, Ibrahim Takouna, Christoph Meinel Infrastructure as a Service Security.

[4] D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating Data Possession and Uncheatable Data Transfer,” Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/.

[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. of CCS ’07, pp.598–609, 2007.

[6] Arshad, J, Townsend, P. and Xu, J. (2013).A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems, 29, 416–428. doi:10.1016/j.future.2011.08.009

[7] Atayero, A.A. and Feyisetan, O. (2011). Security Issues in Cloud Computing: The Potentials of Homomorphic.

Downloads

Published

2019-10-31
CITATION
DOI: 10.26438/ijcse/v7i10.256257
Published: 2019-10-31

How to Cite

[1]
V. Sardana and N. Saxena, “A Novel Approach of Cloud Security by Authentication in Cloud Computing Environment”, Int. J. Comp. Sci. Eng., vol. 7, no. 10, pp. 256–257, Oct. 2019.