CFP last date
20 December 2024
Reseach Article

An Approach for Ensuring Security in Cloud Environment

by Sumita Lamba, Ajay Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 10
Year of Publication: 2014
Authors: Sumita Lamba, Ajay Kumar
10.5120/15760-4420

Sumita Lamba, Ajay Kumar . An Approach for Ensuring Security in Cloud Environment. International Journal of Computer Applications. 90, 10 ( March 2014), 37-41. DOI=10.5120/15760-4420

@article{ 10.5120/15760-4420,
author = { Sumita Lamba, Ajay Kumar },
title = { An Approach for Ensuring Security in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 10 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 37-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number10/15760-4420/ },
doi = { 10.5120/15760-4420 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:43.454776+05:30
%A Sumita Lamba
%A Ajay Kumar
%T An Approach for Ensuring Security in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 10
%P 37-41
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many people consider "CLOUD" as the buzzword for internet and utility computing, but this innovative paradigm of computing is imparting new designs of computing platforms. Being a pool of ample of resources, cloud computing allows the access to the users through internet. It has greatly emerged as a computing standard where the computing infrastructure is served as internet services and has made an effective change in the way of computation and services for its customers. There is a need of such a cloud which doesn't compromise with any of the following: Integrity, reliability, flexibility and elasticity, and ensure security for storing and transmitting the data. In cloud, the user's data is stored tenuously and they have no control over it, so security issues have always been dilemma here. In this paper, we have proposed a new practical approach to secure the cloud environment for data storage by blending authentication with hashing and encryption algorithm. We aim to develop a secure cloud environment which ensures the standards of user and data authentication, data confidentiality and user oriented access control.

References
  1. Rohit Bhadauria. "Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques" International Journal of Computer Applications (0975 – 888) Volume 47– No. 18, June 2012.
  2. Edward S David. Promises and Challenges of Cloud Computing. International Journal of Computer Applications (0975 – 8887) International Conference on Current Trends in Advanced Computing "ICCTAC-2013".
  3. Anup Mathew. "Survey Paper on Security & Privacy Issues in Cloud Storage Systems", EECE 571B, Term survey paper, April 2012.
  4. S. Sabarish, G. Basha & A. Padmashree, Tirupur M. King, B. Zhu, and S. Tang. "Secured cloud environment with a new approach", "Optimal path planning," Mobile Robots, vol. 8, no. 2, pp. 520-531, March 2001.
  5. Priyanka V. Mogre, Girish Agarwal, Pragati Patil . "Data Security and its techniques in Cloud Storage – A Review" International Journal of Engineering Research and Technology Vol. 1 (02), 2012, ISSN 2278 – 0181.
  6. Sanjoli Singla, Jasmeet Singh. Cloud Data Security using Authentication and Encryption Technique International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323 Volume 2, Issue 7, July 2013.
  7. Mr. Prashant Rewagad, Ms. Yogita Pawar. "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing" International Conference on Communication Systems and Network Technologies,2013.
  8. Pradeep Bhosale, Priyanka Deshmukh, Girish Dimbar and Ashwini Deshpande. Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption, International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 8, October – 2012.
  9. Ankit Kumar Sahu. "Java Web Deployment in Cloud Computing", International Journal of Computer Applications (0975 – 8887) Volume 75– No. 15, August 2013.
Index Terms

Computer Science
Information Sciences

Keywords

User and data authentication data confidentiality user based access control.