CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A 5-Level Security Approach for Data Storage in Cloud

by Bina Kotiyal, Priti Saxena, R. H. Goudar, Rashmi M. Jogdand
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 11
Year of Publication: 2012
Authors: Bina Kotiyal, Priti Saxena, R. H. Goudar, Rashmi M. Jogdand
10.5120/8613-2473

Bina Kotiyal, Priti Saxena, R. H. Goudar, Rashmi M. Jogdand . A 5-Level Security Approach for Data Storage in Cloud. International Journal of Computer Applications. 54, 11 ( September 2012), 29-34. DOI=10.5120/8613-2473

@article{ 10.5120/8613-2473,
author = { Bina Kotiyal, Priti Saxena, R. H. Goudar, Rashmi M. Jogdand },
title = { A 5-Level Security Approach for Data Storage in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 11 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number11/8613-2473/ },
doi = { 10.5120/8613-2473 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:55:26.543806+05:30
%A Bina Kotiyal
%A Priti Saxena
%A R. H. Goudar
%A Rashmi M. Jogdand
%T A 5-Level Security Approach for Data Storage in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 11
%P 29-34
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Everyone in the IT world is bustling with the cloud computing concept. Conversing about the catchphrase cloud, the terms like virtualization, resources, elasticity, security, pay per use basis hit the mind. A key stumbling block of motivating the IT sector towards cloud ethnicity is the lack of conviction on security. The cloud provider, in turn, also needs to insist on authoritarian of the security policies, making trust on the clients. To improve the mutual trust between costumer and cloud provider, a well-understood trust foundation needs to be in place. Keeping in mind this paper presents a new approach to provide five level securities to the data stored and accessed by the cloud user. In cloud, the data of the individual or an organization is stored tenuously and the client does not have any control over it, hence the security becomes a major dilemma. Keeping in mind of the security required, this paper introduces a strong authentication, confidentiality and integrity mechanisms for storing the data of client at the data center. The modernization of this method is to place identity and information separately on different level thus providing five - level security which have no direct communication between them, all working at different places.

References
  1. "Cloud Computing and Computing Evolution", Markus Böhm, Stefanie Leimeister, Christoph Riedl, Helmut Krcmar Technische Universität München (TUM), Germany
  2. Understanding Cloud Computing Vulnerabilities
  3. "A Threat Free Architecture For Privacy Assurance In Cloud Computing IEEE Paper 2011"
  4. "Security in Cloud Computing – Vulnerabilities, Challenges, Models and Path Ahead", Anand Mukundan
  5. Security in Public and Private Cloud Infrastructures, Joyent White paper
  6. Guifen ZHAO, Implementation and Testing of an Identity-based Authentication System, of Information Technology Beijing Municipal Institute of Science & Technology Information Beijing, China
  7. Eun-Jun Yoon,"Robust ID-based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC", School of Electrical Engineering and Computer Science Kyungpook National University Daegu 702-701, Republic of Korea ejyoon@knu. ac. kr
  8. Jan Wiebelitz, "Transparent Identity-based Firewall Transition for eScience", Germany. er. de
  9. "Addressing Cloud Computing Security Issues", Dimitrios Zissis, Dimitrios Lekkas
  10. Luis Rodero-Merino, "Building Safe Paas Clouds: A Survey on Security in Multitenant Software Platforms"
  11. Hongwei Li, "Identity-Based Authentication for Cloud Computing"
  12. S. Timm, "Authentication, Authorization, and Contextualization in Fermi Cloud"
  13. Hyosik Ahn, "User Authentication Platform using Provisioning in Cloud Computing Environment"
  14. Farzad Sabahi, ""Cloud Computing Security Threats and Responses"
  15. S. Subashini, "A survey on security issues in service delivery models of cloud computing"
  16. Sambhaji Sarod, "The Effective and Efficient Security Services for Cloud Computing"
  17. Danish Jamil, "Security Issues In Cloud Computing And Countermeasures"
Index Terms

Computer Science
Information Sciences

Keywords

Hashed Password Double Authentication Data Storage Security IP Notification E-mail Encryption