MEASURED SECURITY FEATURES IMPLEMENTATION IN CLOUD ENVIRONMENT

Chandhini K

Abstract


Cloud computing encompasses a set of IT based Services, delivered by a third party provider who owns the infrastructure and provided to customers over a network. It is now one of the fastest growing technologies of the IT trade for business. Thus the high flexibility and portability of cloud have raised numerous security concerns. Security issue in cloud computing has become the vital reason of impeding its development. This work shows a concern on the security element in cloud environment for small business addressing their shortcomings and finding solutions for it. Measured security features have been implemented by developing a secured data encryption, exchange and decryption infrastructure resulting in a data security model.

Keywords


IT Based Services; Cloud Environment; Measured Security; Data Encryption;

References


R. Velumadhava Rao, K. Selvamani, “Data Security Challenges and Its Solutions in Cloud Computing" International Conference on Computer, Communication and Convergence (ICCC 2015), International Conference, Procedia Computer Science 48( 2015 ) 204 – 209.

PreetiSirohi and Amit Agarwal, "Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust" 2015 1st International Conference on Next Generation Computing Technologies (NGCT-2015) Dehradun, India, 4-5 September 2015

M. Sugumaran, BalaMurugan. B, D. Kamalraj, " An Architecture for Data Security in Cloud Computing" 2014 World Congress on Computing and Communication Technologies 2014 IEEE DOI 10.1109/WCCCT.2015.53.

Aws NaserJaber, MazlinaBinti Abdul Majid , " A Study in Data Security in Cloud Computing," 2014 IEEE 2014 International Conference on Computer, Communication, and Control Technology (I4CT 2014), September 2 - 4, 2014 - Langkawi, Kedah, Malaysia

Chaoqun Yu1,Lin Yang2,Yuan Liu1,Xiangyang Luo1,2, “RESEARCH ON DATA SECURITY ISSUES OF CLOUD COMPUTING”, International Journal of Computer Applications Volume 113 - No. 1, March 2014.

Hu Shuijing, “Data Security : the challenges of cloud computing” 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation 2014.

K Hashizume et al., "An analysis of security issues for cloud computing", Journal of Internet Services and Applications, a Springer open journal, pp 1-13, 2013.

Kamara, S., Lauter, K., "Cryptographic cloud storage", Proceedings of the 14th international conference on Financial cryptography and data security, FC' 10, pp. 136- 149, Springer-Verlag, Berlin, Heidelberg (2012)

EmanM.Mohamed, Hatem S. Abdelkader, " Enhanced Data Security Model for Cloud Computing." The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May Cloud and Mobile Computing Track 2015.

Vinay kumar pant, Jyoti Prakash., " Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques"978-1-4673-7910-6/15/$31.00 ©2014 IEEE.

SiddharthDuttChoubey, Mohit Kumar Namdeo, “Study of Data Security and Privacy Preserving Solutions in Cloud Computing.”978-1-4673-7910-6/15/$31.00©2014 IEEE

AbdulazizAljabre,"Cloud Computing for Increased Business Value", International Journal of Business and Social Science, Vol. 3, No. 1, January 2013.

M. Sudha, Dr.Bandaru Rama Krishna Rao, M. Monica, "A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment", International Journal of Computer Applications (09758887) Volume 12 No.8, December 2013.

J. Heiser, and M. Nicolett, "Accessing the Security Risks of Cloud Computing", G00157782, Gartner,Inc., Stamford, CT, 2010.

MohitMarwaha, Rajeev Bedi, "Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, pp 367-370, 2008.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.