CFP last date
20 January 2025
Reseach Article

A Novel Framework for Cloud Security against Data Breach

by Arpit Gupta, Vaishali Chourey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 3
Year of Publication: 2014
Authors: Arpit Gupta, Vaishali Chourey
10.5120/18053-8966

Arpit Gupta, Vaishali Chourey . A Novel Framework for Cloud Security against Data Breach. International Journal of Computer Applications. 103, 3 ( October 2014), 23-30. DOI=10.5120/18053-8966

@article{ 10.5120/18053-8966,
author = { Arpit Gupta, Vaishali Chourey },
title = { A Novel Framework for Cloud Security against Data Breach },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 3 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 23-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number3/18053-8966/ },
doi = { 10.5120/18053-8966 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:35.079268+05:30
%A Arpit Gupta
%A Vaishali Chourey
%T A Novel Framework for Cloud Security against Data Breach
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 3
%P 23-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is the most emerging technology now-a-days. Every internet user accessing cloud services either directly or indirectly without knowing or aware of security aspects because of trust between the user and the cloud service provider. But, this trust is harmed by the malicious user or hacker by breaching the data, data theft & data loss by using various mechanisms. In this research paper we proposed a architecture which provide protection to the cloud environment and controls Data Breach and Data Loss. In this research paper we also explore the deficiencies in the current cloud threat control strategies. No single mechanism can solve the serious cloud security problem. So, use of many traditional and technical strategies provide the secure cloud computing environment.

References
  1. Paul Simmonds, Chris Rezek , " Security Guidance for Critical Areas of Focus in Cloud Computing", 2011 Cloud Security Alliance.
  2. The Notorious Nine Cloud Computing Top Threats in 2013,Cloud Security Alliance.
  3. Xufei Zheng, Yonghui Fang, " An AIS-based Cloud Security Model", in IEEE International Conference on Intelligent Control and Information Processing , in August 13-15, 2010 , pp. 153 - 158 .
  4. V. Nirmala, "Data confidentiality and Integrity Verification using user Authenticator scheme in Cloud", in Proceedings of 2013 IEEE International Conference on Green High Performance Computing, March 14-15,2013, pp. 1-5.
  5. Arjun Kumar, " Secure Storage and Access of Data in Cloud Computing", in 2012 IEEE International Conference on ICT Convergence (ICTC), 15-17 Oct. 2012, pp. 336 – 339.
  6. Chandramohan. D, " A Novel Framework to Prevent Privacy Breach in Cloud Data Storage Area Service", in Proceedings of 2013 IEEE International Conference on Green High Performance Computing, 14-15 March 2013, pp. 1-4
  7. Uma Somani,Kanika Lakhani, Manish Mundra, "Implementing Digital Signature with RSA Encryption Algorithm to enhance the Data Security of cloud in cloud computing" in 2010 IEEE 1st International conference Parallel ,Distributed & Grid computing (PDGC-2010), 28-30 Oct. 2010 , pp. 211 – 216.
  8. Rashmi M. Jogdand, R. H. Goudar, Gazal Begum Sayed, Pratik B. Dhamanekar, "Enabling public verifiability & availability for secure data storage in cloud computing", Springer Berlin Heidelberg, DOI-10. 1007/S12530-013-9095-4.
  9. Pachipala Yellamma,Challa Narsimham, Velagapudi sreeivas, "Data security in Cloud Using RSA" in 2012 CSI Sixth International Conference on Software Engineering (CONSEG), 13 July 4-6, 2013 , pp. 1-8.
  10. Nandita Sengupta, Jeffrey Holmer, "Designing of Cryptography Based Security System For Cloud Computing" , in 2013 IEEE International conference on cloud & ubiquitous computing & emerging technologies, Pune 15-16 Nov. 2013, pp. 52-57.
  11. Mehdi Hojabri, K. Venkatrao, "Innovation in Cloud Computing: Implementation of Kerbores version5 in Cloud Computing in order to enhance the security issues ", in 2013 IEEE International Conference on Computing Technologies, 21-22 Feb. 2013, pp. 452 – 456.
  12. Prashant Rewagad, Yogita Pawar," Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing", in 2013 IEEE International Conference on Communication Systems and Network Technologies, 6-8 April 2013, pp. 437 – 439.
  13. Arpit Gupta, Vaishali Chourey, "Cloud Computing: Security Threats & Control Strategy using Tri-Mechanism", Proceedings in 2014 IEEE International Conference on Control, Instrumentation, Communication and Computational Technologies , 10-11 July, 2014, pp. 324-331.
  14. Fei Sun, Shi-ping Yang , "Based on the agent of elliptic curve Diffie-Hellman Key Establishment Protocol " in 2010 IEEE 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) , pp. 134-136.
  15. Sung-Ming Yen and Chi-Sung Laih, "Improved Digital Signature Algorithm ",in 2010 IEEE Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), pp. 236 - 240 .
  16. Dai Zibin, Zhou Ning , "FPGA Implementation of SHA-1 Algorithm ", in IEEE 5th International Conference on ASIC, 21-24 Oct, 2003 , vol-2, pp. 1321 – 1324.
  17. Haoyu Wang, Junjun Kong, Yao Guo and Xiangqun Chen, "Mobile Web Browser Optimizations in the Cloud Era: A Survey ", in 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering , pp. 527 – 536.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud security threats