CFP last date
20 January 2025
Reseach Article

Data Security Enhancement in Cloud Computing using Proxy Blind Signature

by Subasish Mohapatra, Subhadarshini Mohanty, Arunima Hota, Shradha Pattanayak
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 2
Year of Publication: 2017
Authors: Subasish Mohapatra, Subhadarshini Mohanty, Arunima Hota, Shradha Pattanayak
10.5120/ijca2017913119

Subasish Mohapatra, Subhadarshini Mohanty, Arunima Hota, Shradha Pattanayak . Data Security Enhancement in Cloud Computing using Proxy Blind Signature. International Journal of Computer Applications. 161, 2 ( Mar 2017), 27-31. DOI=10.5120/ijca2017913119

@article{ 10.5120/ijca2017913119,
author = { Subasish Mohapatra, Subhadarshini Mohanty, Arunima Hota, Shradha Pattanayak },
title = { Data Security Enhancement in Cloud Computing using Proxy Blind Signature },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 2 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number2/27121-2017913119/ },
doi = { 10.5120/ijca2017913119 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:40.412504+05:30
%A Subasish Mohapatra
%A Subhadarshini Mohanty
%A Arunima Hota
%A Shradha Pattanayak
%T Data Security Enhancement in Cloud Computing using Proxy Blind Signature
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 2
%P 27-31
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a rapidly growing internet based computing that endeavors to be dynamic, reliable and available with guaranteed quality of service. This has become a sophisticated computing platform or technology for customers as well as organizations for its availability of resources such as software, storage and network with minimum cost. Using the business model like Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS) this environment have increased distribute computing capacity. Preserving confidentiality, integrity and availability are the vexing issues in cloud computing environment. This paper highlights cloud computing threats and proposes a distributed and efficient encryption algorithm to enhance the data security in cloud.

References
  1. Manvi, Sunilkumar S., and Gopal Krishna Shyam. "Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey." Journal of Network and Computer Applications 41 (2014): 424-440.
  2. Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." (2011).
  3. Nandgaonkar, Suruchee V., and A. B. Raut. "A comprehensive study on cloud computing." International Journal of Computer Science and Mobile Computing 3.4 (2014): 733-738.
  4. Stieninger, Mark, and Dietmar Nedbal. "Characteristics of cloud computing in the business context: A systematic literature review." Global Journal of Flexible Systems Management 15.1 (2014): 59-68.
  5. Yau, Stephen S., and Ho G. An. "Software engineering meets services and cloud computing." Computer 44.10 (2011): 47-53.
  6. Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.
  7. Ajoudanian, Sh, and M. R. Ahmadi. "A novel data security model for cloud computing." International Journal of Engineering and Technology 4.3 (2012): 326.
  8. Ahmed, Monjur, and Mohammad Ashraf Hossain. "Cloud computing and security issues in the cloud." International Journal of Network Security & Its Applications 6.1 (2014): 25.
  9. Liu, Bingwei, et al. "Information fusion in a cloud computing era: a systems-level perspective." IEEE Aerospace and Electronic Systems Magazine 29.10 (2014): 16-24.
  10. Priyadharshini, V., and A. Malathi. "Survey on software testing techniques in cloud computing." CoRR, abs/1402.1925 (2014).
  11. Wei, Lifei, et al. "Security and privacy for storage and computation in cloud computing." Information Sciences 258 (2014): 371-386.
  12. J. Katz, A. Sahai, and B. Waters, “Predicate Encryption, Supporting Disjunctions, Polynomial Equations, and InnerProducts,” LNCS vol. 4965/2008, pp. 146-162, ©Springer Berlin Heidelberg, 2008.
  13. Sahu, Rajeev Anand, and Sahadeo Padhye. "Provable secure identity based multi‐proxy signature scheme." International Journal of Communication Systems 28.3 (2015):497-512.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security threats Proxy blind signature.