CFP last date
20 January 2025
Reseach Article

Article:A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment

by M.Sudha, Dr.Bandaru Rama Krishna Rao, M.Monica
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 8
Year of Publication: 2010
Authors: M.Sudha, Dr.Bandaru Rama Krishna Rao, M.Monica
10.5120/1698-2135

M.Sudha, Dr.Bandaru Rama Krishna Rao, M.Monica . Article:A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment. International Journal of Computer Applications. 12, 8 ( December 2010), 19-23. DOI=10.5120/1698-2135

@article{ 10.5120/1698-2135,
author = { M.Sudha, Dr.Bandaru Rama Krishna Rao, M.Monica },
title = { Article:A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 8 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number8/1698-2135/ },
doi = { 10.5120/1698-2135 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:08.126985+05:30
%A M.Sudha
%A Dr.Bandaru Rama Krishna Rao
%A M.Monica
%T Article:A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 8
%P 19-23
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an Internet based development, in concept, it is a paradigm shift whereby details are abstracted from the users who no longer need knowledge of, expertise in, or control over the technology infrastructure that supports them. According to a 2008 IEEE paper, “Cloud Computing is a paradigm in which information is permanently stored in servers on the internet and cached temporarily on clients that include desktops, entertainment centers, table computers and notebooks etc.” Some examples of emerging Cloud computing infrastructures are Microsoft Azure, Amazon EC2, Google App Engine, and Aneka. Cloud service providers enable users to access and use the necessary resources via the internet. To provide these resources, providers often fall back upon other providers in the cloud, hence this raises security issues in Cloud Environment as Clouds have no borders and the data can be physically located anywhere in the world. So this phenomenon raises serious issues regarding user authentication and data confidentiality. Hence it is proposed to implement a simple Data Protection framework which performs authentication, verification and encrypted data transfer, thus maintaining data confidentiality. Programming is performed using JAVA platform, Cloud environment is created using wired and wireless LAN networks. And Advanced Encryption Standard security algorithm is implemented for ensuring security framework.

References
  1. cong Wang, Qian Wang and Kui Ren. “Ensuring Data Storage Security in Cloud computing” 978-1-4244-3876-1/2009 IEEE.
  2. Lijun Mei, W.K.Chan and T.H.T se, “A Tale of Clouds: Paradigm comparisons and some thoughts on research issues”, 2008 IEEE Asia-Pacific Services Computing Conference.
  3. John Harauz, Lori M. Kaufman and Bruce Potter, “Data security in the world of cloud computing “,2009 IEEE CO Published by the IEEE Computer and Reliability Societies.
  4. Siani Pearson, “Taking account of Privacy when Designing Cloud computing Services” CLOUD’09, May 23, 2009, Vancouver, Canada, 2009 IEEE.
  5. Meiko Jensen, Jorg Schwenk, Nils Gruschka and Luigi Lo Iacono, “On technical security issues in cloud computing ”978-0-7695- 3840-2/ 092009,IEEE Computer Society.
  6. Balachandra Reddy Kandukuri, Ramakrishna Paturi V and Dr. Atanu Rakshit, “Cloud securityIssues” 978-0-7695-3811-2/09 2009, IEEE computer society.
  7. Guy Bunker, Farnam Jahanian, Aad van Moorsel and Joseph Weinman,” Dependability in the cloud: Challenges and opportunities”, IEEE 2009.
  8. Lizhe Wang, Jie Tao, Marcel Kunze , Alvaro Canales Castellanos, David Kramer and Wolfgang Karl, “scientific Cloud computing: early Definition and Experience”, 2008 IEEE.
  9. Rajkumar Buyya1, Rajiv Ranjan2 and Rodrigo N. Calheiros, “Modeling and simulation of scalable cloud computing Environments and the CloudSim Toolkit: challenges and opportunities” 978-1-4244-4907-1/09, 2009 IEEE
  10. Ivona Brandic,“Towards Self manageable Cloud services” 0730-3157/09 , 2009 IEEE.
  11. http://www.cloudsecurity.org, accessed on April 10, 2009.
  12. D.J. Solove, “A Taxonomy of Privacy”, University of Pennyslavania Law Review, vol 154, no 3, January 2006, p.477. http://papers.ssrn.com/.
  13. Cloud Security Alliance. http://www.cloudsecurityalliance.org.
  14. T. R. Peltier, J. Peltier, and J. Blackley, “Information Security Fundamentals”. Auerbach Publications, Boston, MA, USA, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Data security Internet Advanced Encryption standard