CFP last date
20 December 2024
Reseach Article

Survey on Data Classification and Data Encryption Techniques Used in Cloud Computing

by Prakash Sawle, Trupti Baraskar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 12
Year of Publication: 2016
Authors: Prakash Sawle, Trupti Baraskar
10.5120/ijca2016908586

Prakash Sawle, Trupti Baraskar . Survey on Data Classification and Data Encryption Techniques Used in Cloud Computing. International Journal of Computer Applications. 135, 12 ( February 2016), 35-40. DOI=10.5120/ijca2016908586

@article{ 10.5120/ijca2016908586,
author = { Prakash Sawle, Trupti Baraskar },
title = { Survey on Data Classification and Data Encryption Techniques Used in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 12 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number12/24103-2016908586/ },
doi = { 10.5120/ijca2016908586 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:35:38.310221+05:30
%A Prakash Sawle
%A Trupti Baraskar
%T Survey on Data Classification and Data Encryption Techniques Used in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 12
%P 35-40
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an imminent revolution in information technology (IT) industry because of its performance, accessibility, low cost and many other luxury features. Security of data in the cloud is one of the major issues which acts as barrier in the implementation of cloud computing. In past years, a number of research works have targeted this problem. In this paper discuss some of the data classification techniques widely used in cloud computing. The objective of data classification is to find out the required level of security for data and to protect data by providing sufficient level of security according to the risk levels of data. In this paper also discuss a survey of existing solutions for security problem, discuss their advantages, and point out any disadvantages for future research. Specifically, focus on the use of encryption techniques, and provide a comparative study of the major encryption techniques.

References
  1. S. K. Sood, 2012 A combined approaches to ensure data security in cloud computing, ACM, Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838.
  2. Peter Mell and Timothy Grance, 2011.The NIST Definition of Cloud Computing,NIST Special Publication 800-145
  3. Faraz Fatemi Moghaddam, Moslem Yezdanpanah ,Touraj Khodadadi 2014 VDCI: Variable Data Classification Index to Ensure Data Protection in Cloud Computing Environments, IEEE Conference on Systems, Process and Control (ICSPC 2014), pp.53-57 2
  4. Munwar Ali Zardari, Low Tang Jung, Nordin Zakaria, 2013 Hybrid Multi-cloud Data Security (HMCDS) Model and Data Classification IEEE Advanced Computer Science Applications and Technologies (ACSAT), pp. 166-171 2
  5. Munwar Ali Zardari, Low Tang Jung, Nordin Zakaria, 2014 K-NN Classifier for Data Confidentiality in Cloud Computing, IEEE Computer and Information Sciences (ICCOINS), pp. 1 – 6
  6. D.M. Prabhakar, K.S. Joseph, 2013, A new approach for providing data security and secure data transfer in cloud computing, International Journal of Computer Trends and Technology (IJCTT) pp 1202-120
  7. Nandita Sengupta, Jeffrey Holmes 2013, Designing of Cryptography Based Security System for Cloud Computing, IEEE International Conference on Cloud & Ubiquitous Computing & Emerging Technologies pp. 52-57
  8. Feng Zhao, Chao Li, Chun Feng Liu 2014, A cloud computing security solution based on fully homomorphic encryption, IEEE Advanced Communication Technology (ICACT), pp. 485 - 488
  9. Xin Dongy, Jiadi Yuy, Yuan Luoy, Yingying , Guangtao Xuey and Minglu Li, 2013, Achieving Secure and Efficient data collaboration in Cloud computing, IEEE, pp1-6
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Classification Data confidentiality Cryptography Caesar Cipher Vigenere Cipher fully Homomorphic and Hierarchical Identity Based Encryption (HIBE).