Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2017, Journal 4 Research - J4R Journal
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Abstract : Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale industry, Data security has become the most important issue of cloud computing security. Though many solutions have been proposed, many of them only considers one side of security ;this paper proposes the cloud data security must be considered to analyze the data security risk, the data security requirements, deployment of security functions and the data security process through encryption. Distribution of file is done on cloud servers with token generation. The security architecture of the system is designed using encoding algorithms, which eliminates the fraud that occurs today with stolen data. There is no danger of any data sent within the system being intercepted, and replaced. The system is acceptably secure, but that the level of encoding has to be stepped up as computing power increases. Results in order to be secured the system the communication between modules is encoded. Since the customer does not have control over data the cloud provider should assure the customer that data is not modified. In this paper a data correctness scheme is proposed in which a cloud service provider assures the user that the data is stored in the cloud is safe. This scheme also achieves the integration of storage correctness insurance and data error localization i.e., the identification of misbehaving server(s). Keywords: challenge, data storage, error localization, misbehaving server, storage correctness
International Journal of Engineering Research and Technology (IJERT)
IJERT-Data Security and Cryptography in Cloud Environment2015 •
https://www.ijert.org/data-security-and-cryptography-in-cloud-environment https://www.ijert.org/research/data-security-and-cryptography-in-cloud-environment-IJERTV4IS061013.pdf Cloud is an intelligent computing delivery service. It provides unlimited service provisioning to users based on their demand. Services are processed by automated APIs(Application Programming Interface) without human interaction. Storage is one of the main services from the Cloud. Users could outsource their data to cloud. Cloud provides reliable storage. Data outsource to cloud are stored in different cloud datacenter located in different geographical location to maintain the reliable storage. Cloud has many challenges like scalability, resource allocation, virtualization, security, trust, service level agreement and etc. Among these challenges, security is the top level concern in cloud storage. Cloud storage has many security related issues. Traditionally, Security is addressed by cryptography techniques. This paper describes the data security challenges, importance of security and security mechanism for cloud storage. Different security mechanisms are addressed in this paper, among them confidentiality, integrity and authentication are important for data security in cloud. An efficient cryptography technique might protect the cloud environment from unauthorized usage.
2013 •
Cloud computing is the computing paradigm which enable obtaining resources like software, hardware, services over the internet. Most of user store their data on cloud for data security and integrity are prime related. In this article the problem of ensuring data integrity and security of data storage in cloud computing. For ensuring correctness of data, we assume the task of allowing a Third party auditor(TPA) used for exposing risk of cloud storage services on behalf of the cloud client to verify data integrity stored in the cloud. This paper focus on the data security, we proposed erasure correcting code in the file distribution to provide the redundancies and guarantee data dependability. By using homomorphic token with distributed verification of erasure coded data ,our scheme achieve storage correctness as well as error localization. Extensive security analysis show the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data alternation attac...
— Cloud computing is a kinds of computing that depend on distribution computing resources before having local servers or own devices to knob applications. Cloud computing is equivalent to grid computing, In the cloud is a kind of computing where vacant handing out rounds of the entire computers in a network are harnesses to solved the concerns also focused for some stand-alone mechanism. Cloud computing security mentions to the group of processes, procedures and standards designed to deliver information security guarantee in a cloud environment. Cloud computing security comprises both logical and physical security concerns across all the diverse various models of software platform, infrastructure and software. It also defines how these services are delivered (public, private or hybrid delivery model).
–Cloud computing is only of the most growing area of research, there are lots of work in cloud like security and data base. In this paper we study about cloud architecture or cloud security concerns and their solution at the completion of paper we compare DES or RSA and then compare the result.We propose a secure the Cloud means secure the treatments and storage " databases hosted by the Cloud provider ". Security goals of data include three points namely: Confidentiality, Integrity, and Availability (CIA). Confidentiality of data in the cloud is accomplished by encryption/ Decryption process.
2020 •
Abstract-Cloud computing is the computing model that allow for obtaining resources such as software on cloud, hardware and services over the internet. The clients stores their data on cloud for data security, for ease of accessing and integrity are prime related. In this paper, the problem of ensuring data integrity and security of data storage provided on cloud from the client while storing data over cloud. To ensuring correctness of data, it assumes that authentication required for uploading and retrieving of data over cloud and these task of allowing by a trusted party (TP) used for exposing risk of cloud storage services on behalf of the cloud client to verify data integrity stored in the cloud. This paper focuses on the data security, we proposed erasure correcting method in the file distribution to the cloud and the client authentication provides the redundancies and guarantees data dependability. By using RSA encryption technique and by calculating hash value with distributed...
World Academy of Research in Science and Engineering
Strong and Secure Mechanism for Data Storage in Cloud EnvironmentThis present research paper proposes the security is frequently referred to as a standout among the most unlimited issues in the cloud processing as distributed computing gives a helpful and huge measure of capacity information at extremely low and effective expense so searching for a legitimate wellbeing measures is basic. It is contended that the Cloud is proposed to deal with a lot of information, along these lines aggressors can be search for taking out the information as it includes different data's being put away. A many customers are surfing cloud for diverse purposes hence they need profoundly protected & persevering administrations. The developing of cloud is growing day by day which utilizes the additional level of protection and validation. We propose a basic information assurance model where information is encoded utilizing MD5 with RSA and Authenticated by Diffie-Hellman calculation prior to it is propelled in the cloud, therefore guaranteeing data privacy and security.
International Journal of Advanced Research in Computer Science
A Review on Data Security Issues in Cloud Computing for Analysis of Integrity and Confidentiality2021 •
International Journal of Engineering Research and Technology (IJERT)
IJERT-Advanced Data Integrity Checking Mechanism in Cloud2019 •
https://www.ijert.org/Advanced-Data-Integrity-Checking-Mechanism-in-Cloud https://www.ijert.org/research/Advanced-Data-Integrity-Checking-Mechanism-in-Cloud-IJERTCONV7IS08066.pdf Cloud computing is one of the important area, which includes the delivery of hosted services over the Internet. Both time and money can be saved by using the cloud services. The major application of cloud computing is cloud storage, which offers user scalability, flexibility, high quality storage and computation services. Files are outsourced to the cloud by the data owner for the long term storage. Cloud storage servers are not fully trustable; data owner requires dependable means to check the integrity of the files which is outsourced to the remote cloud servers. To solve this problem, data integrity checking mechanism has been presented. Many of the existing approaches have susceptibility in efficiency or data dynamics. However, there are some security issues which are to be solved for end users and enterprises for the storage of data in the cloud. The fact is that users will lose the physical control of their data after outsourcing. The data stored in the cloud can be hacked by the hacker, so the cloud user is worried about the integrity of the data stored in the cloud. The main goal of the project is to suggest an efficient public auditing technique using Third Party Auditor (TPA) to verify the integrity of data stored in the cloud. In the proposed system encryption and decryption can be performed by using AES algorithm and Secure Hash Algorithm (SHA-1) algorithm is used to generate verification metadata to check the integrity of the data.
2015 •
Studies in Philosophy and Education
Alimentary Images as Metaphor of Education2024 •
Applied Mobilities
The bicycle as a symbol of lifestyle, status and distinction. A cultural studies analysis of urban cycling (sub)cultures in Berlin2020 •
2023 •
Acta Paediatrica
Paediatric apnoeas are not related to a specific respiratory virus, and parental reports predict hospitalisation2016 •
Acta Neuropathologica
Cerebellar degeneration in the Niemann-Pick type C mouse1993 •
SSRN Electronic Journal
Universities and Colleges as Socially Responsible Investors2014 •
Production and Operations Management
Managing Outsourced Software Projects: An Analysis of Project Performance and Customer Satisfaction2010 •
General and Comparative Endocrinology
Effects of atrial natriuretic factor on corticosteroid and catecholamine secretion by the adrenals of Xenopus laevis1992 •
International Journal of Current Microbiology and Applied Sciences
Effect of Nitrogen Level and Plant Growth Regulators in Maize (Zea mays L.)2021 •
American journal of physiology. Lung cellular and molecular physiology
Aurothioglucose Does Not Improve Alveolarization or Elicit Sustained Nrf2 Activation in C57Bl/6 Models of Bronchopulmonary Dysplasia2018 •