Open Access Open Access  Restricted Access Subscription Access

Providing Confidentiality and Integrity for Data Stored On Cloud

Ms. Chaitali Jadhav, Ms. C.P. Jhadav

Abstract


tasks performed on the computer and it is visualized as the next generation architecture of IT Enterprise. The Cloud represents the Internet. In this , we focus on secure data storage in cloud; it is an important aspect of quality of service. To ensure the correctness of user‘s data in the cloud, We propose effective and adaptable scheme with salient qualities.

This plan accomplishes information capacity accuracy permit the verified client to get to the information and information mistake confinement, I. e. the recognizable proof of acting mischievously servers. Distributed computing gives the method for sharing circulated assets and administrations that have a place with various associations or destinations. Since cloud computing share distributed resources via network in the open environment thus it makes security problems. In this paper some important security services including authentication, integrity, confidentiality provided in cloud computing system.


Full Text:

PDF

References


. Ensuring data storage security in cloud computing- Cong Wang ,Qian Wang & Kui Ren Department of ECE

. International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com

. Neha Jain and Gurpreet Kaur ―Implementing DES Algorithm in Cloud for Data Security‖ VSRD International Journal of CS & IT Vol. 2 (4), 2012

. Mandeep Kaur and Manish Mahajan ―Implementing Various Encryption Algorithms To Enhance The Data Security Of Cloud In Cloud Computing‖ VSRD International Journal of Computer Science & Information Technology, Vol. 2 No. 10 October 2012

. Amir Mohamed Talib‖ Security Framework of Cloud Data Storage Based on Multi Agent System Architecture:

Semantic Literature Review‖ Computer and Information Science Vol. 3, No. 4; November 2010

.Rachna Arora and Anshu Parashar ‖ Secure User Data in Cloud Computing Using Encryption Algorithms‖ International Journal of Engineering Research and (IJERA) Application sISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926

. B. Ravi Kumar, Dr.P.R.K.Murti‖ Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology‖ B. Ravi Kumar et al. / International Journal on Computer Science and Engineering (IJCSE) Vol. 3 No. 7 July 2011.

. Anthony T. Velte Toby J. Velte, Ph.D. Robert Elsenpeter Cloud Computing: A Practical Approach Copyright © 2010 by The McGraw-Hill Companies

. Matthew J. Harmon Cloud Security (ISC)2 Twin Cities Area Chapter 2013 Annual Meeting 18 June 2013

K Nava Jyothi Practical Approach to Cloud Centre for Development of Advanced Computing, Hyderabad 8/9/2010 [11]. Tobias Kurze_, Markus Klemsy, David Bermbachy, Alexander Lenkz, Stefan Taiy and Marcel Kunze Cloud Federation Karlsruhe Institute of Technology (KIT), Kaiserstrasse 12, 76131 Karlsruhe, Germany

. N. M. Sawant, V. V. Pottigar, N. S. Mane, A Survey on Auditing Technique used for preserving privacy of data stored on cloud International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016.

SHA1 Description, B Thomas Golisano College,http://www.cs.rit.edu/~ bcw5910/482 TeamFlux.pdf


Refbacks

  • There are currently no refbacks.