CFP last date
20 January 2025
Reseach Article

Survey on Securing Data in Cloud

by Vijini Mary Kurian, Rosini Thanka.m
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 15
Year of Publication: 2012
Authors: Vijini Mary Kurian, Rosini Thanka.m
10.5120/9191-3616

Vijini Mary Kurian, Rosini Thanka.m . Survey on Securing Data in Cloud. International Journal of Computer Applications. 57, 15 ( November 2012), 21-24. DOI=10.5120/9191-3616

@article{ 10.5120/9191-3616,
author = { Vijini Mary Kurian, Rosini Thanka.m },
title = { Survey on Securing Data in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 15 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number15/9191-3616/ },
doi = { 10.5120/9191-3616 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:05.653487+05:30
%A Vijini Mary Kurian
%A Rosini Thanka.m
%T Survey on Securing Data in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 15
%P 21-24
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an innovative information system architecture which reduces the overall client side resource requirements. Even though the data outsourcing reduce the burden of client storage the clients no longer have physical possession of data which will leads to so many security issues. Hence the user need to make sure that their data is secure in clouds. Auditing and reporting of cloud service providers is a perfect solution that is required to be in place for all cloud services.

References
  1. Dimitrios Zissis , Dimitrios Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, 28(2012) 583-592, December 2010.
  2. Armbrust, M. , Fox, A. , Griffith, R. , Joseph, A. D. , Katz, R. H. , Konwinski, A. , Lee, G. Patterson, D. A. , Rabkin, A. , Stoica, I. , Zaharia, M, A view of cloud computing, 2010, Communication ACM 53 (4), 50–58.
  3. Ateniese, G. , Burns, R. C. , Curtmola, R. , Herring, J. , Kissner, L. , Peterson, Z. N. J. , Song, D. X. , Provable data possession at untrusted stores, International Proceedings of the 2007 ACM Conference on Computer and Communications Security, pp. 598–609, 2007.
  4. Ateniese, G. , Pietro, R. D. , Mancini, L. V. , Tsudik, G. , Scalable and efficient provable data possession, International Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Secure Communication, pp. 1–10, 2008.
  5. Erway, C. C. , Küpc¸ ü, A. , Papamanthou, C. , Tamassia, R. , Dynamic provable data possession, International Proceedings of the 2009 ACM Conference on Computer and Communications Security, pp. 213–222, 2009.
  6. Juels Jr. , A. , Kaliski, B. S. , Pors: proofs of retrievability for large files International Proceedings of the 2007 ACM Conference on Computer and Communications Security, pp. 584–597, 2007.
  7. Shacham, H. , Waters, B. , Compact proofs of retrievability, 14th International Conference on the Theory and Application of Cryptograpy and Information Security, pp. 90–107, 2008.
  8. Wang, C. , Wang, Q. , Ren, K. , Lou, W. , Privacy-preserving public auditing for data storage security in cloud computing, International Conference on Computer Communications Proceedings IEEE, pp. 1–9, 14-19, 2010.
  9. Yan Zhua,b,, Hongxin Huc, Gail-Joon Ahnc, Stephen S. Yauc, Efficient audit service outsourcing for data integrity in clouds, The Journal of Systems and Software 85 (2012) 1083– 1095, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Auditing Cloud Computing Cloud Service Provider Data Integrity