CFP last date
20 December 2024
Reseach Article

Securing Data on the Cloud Server by the User Authentication and Data Security Techniques

by A. Anusha Priya, R. Gunasundari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 4
Year of Publication: 2017
Authors: A. Anusha Priya, R. Gunasundari
10.5120/ijca2017913844

A. Anusha Priya, R. Gunasundari . Securing Data on the Cloud Server by the User Authentication and Data Security Techniques. International Journal of Computer Applications. 165, 4 ( May 2017), 6-12. DOI=10.5120/ijca2017913844

@article{ 10.5120/ijca2017913844,
author = { A. Anusha Priya, R. Gunasundari },
title = { Securing Data on the Cloud Server by the User Authentication and Data Security Techniques },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 4 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 6-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number4/27559-2017913844/ },
doi = { 10.5120/ijca2017913844 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:29.546014+05:30
%A A. Anusha Priya
%A R. Gunasundari
%T Securing Data on the Cloud Server by the User Authentication and Data Security Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 4
%P 6-12
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a model which offers a large number of applications under the different topologies. It is the technology of building a strong data security between the Cloud Service Provider (CSP) and User. Authentication is a direct need of an each and every organization and so it is becoming supreme necessary for an organization not because it copes only with the security threats but the reason to develop the policies, procedures and appliances that provide administrative, physical and logical security. Whenever a distinct request to access to a pool of resources, to use them or update them as desired, then to authenticate such an individual is denoted as an authentication. Securing data is always of vital importance because of the serious nature of the Cloud Computing and large amounts of complex data it carries, the need is also equally important. In this paper, the user authentication on the cloud server can be developed by implementing the different types of authentication methods. The three metric based, of bio metric authentication improve the authentication process on the cloud server which protects the data from the unauthorized users. The data in the cloud storage can be protected by implementing data security algorithms such as RSA and AES. The security algorithms can perform very well to protect the data in the cloud server.

References
  1. A. Anusha Priya , Dr. S. Saravanan,Protecting Healthcare Database by Access Control Method On Cloud Computing Technique - A Survey, international journal of scientific research.2015.
  2. B. Dhivya, L.M.Nithya, Privacy Preserved Secure and Dependable Cloud Data Storage, in International Journal of Computer Science and Management Research NCNICS 2013 Issue.
  3. Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou,ǁ, Privacy- Preserving Public Auditing for Data Storage Security in Cloud Computingǁ in IEEE INFOCOM 2010, San Diego, CA, March 2010.
  4. Deepika Verma1, Er. Karan Mahajan, To Enhance Data Security in Cloud Computing using Combination of Encryption Algorithms, International Journal of Advances in Science and Technology (IJAST) Vol 2, Issue 4, 2014.
  5. Dr. Prerna Mahajan & Abhishek Sachdeva, A Study of Encryption Algorithms AES, DES and RSA for Security, Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15, 2013.
  6. F. M. Shelke, and P. D. Soni,, An enhanced authentication strategy for multiservice authorization over mobile cloud, International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, issue 3, pp. 1669-1672.
  7. Hafiz Zahid Ullah Khan, Comparative Study of Authentication Techniques, International Journal of Video& Image Processing and Network Security IJVIPNS-IJENS Vol 10 No.04, pp: 9-13.
  8. N. Saravanan, A. Mahendiran, N. Venkata Subramanian and N. Sairam, An Implementation of RSA Algorithm in Google Cloud using Cloud SQL,Research Journal of Applied Sciences, Engineering and Technology 4(19): 3574-3579, 2012.
  9. Nasrin Khanezaei, Zurina Mohd Hanapi, A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services, Proceedings of 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014), 12 - 14 December 2014, Kuala Lumpur, Malaysia, pp 58-62.
  10. P. Kalyani Karule , Neha V. Nagrale Comparative Analysis of Encryption Algorithms for Various Types of Data Files for Data Security, International Journal of Scientific Engineering and Applied Science (IJSEAS) – Vol-2, Issue-2, February 2016
  11. Parsi Kalpana and Sudha Singaraju, Data Security in Cloud Computing using RSA Algorithm, International Journal of Research in Computer and Communication technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012, pp 143-146.
  12. Voorsluys, William; Broberg, James; Buyya, Rajkumar (2011) "Introduction to Cloud Computing”. Cloud Computing: Principles and Paradigms. New York, USA: Wiley Press.pp.1– 44.ISBN978-0-470-88799-8.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud server Authentication Data security Bio-metric AES RSA.