CFP last date
20 December 2024
Reseach Article

Comparative Study of Cloud Computing Data Security Methods

Published on February 2015 by Megna Unnikrishnan, Lipi Arun
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 1
February 2015
Authors: Megna Unnikrishnan, Lipi Arun
c2efbaa6-c70d-4800-bb7e-4dab8b084759

Megna Unnikrishnan, Lipi Arun . Comparative Study of Cloud Computing Data Security Methods. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 1 (February 2015), 13-18.

@article{
author = { Megna Unnikrishnan, Lipi Arun },
title = { Comparative Study of Cloud Computing Data Security Methods },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 1 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 13-18 },
numpages = 6,
url = { /proceedings/icaccthpa2014/number1/19430-6005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Megna Unnikrishnan
%A Lipi Arun
%T Comparative Study of Cloud Computing Data Security Methods
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 1
%P 13-18
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing is the concept implemented to decipher the Daily Computing Problems. Cloud computing is basically virtual pool of resources and it provides these resources to users via internet. Cloud computing is the internet based development and used in computer technology. The prevalent problem associated with cloud computing is data privacy, security, anonymity and reliability etc. But the most important between them is security and how cloud provider assures it. The work plan here is to eliminate the concerns regarding data privacy using encryption algorithms to enhance the security in cloud. Have discussed about cloud computing security mechanisms and presented the comparative study of several algorithms.

References
  1. Parsi Kalpana,Sudha Singaraju. 2012 Data Security in Cloud Computing using RSA Algorithm. International Journal of Research in Computer and Communication technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 4.
  2. Mohamed,E. M. , Abdelkader,H. S. , El Etriby,S. 2012 . Enhanced Data Security Model for Cloud Computing. 8th International Conference on Informatics and Systems.
  3. Deyan Chen,Hong Zhao. 2012. Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering IEEE .
  4. I-Hsun Chuang,Syuan-Hao Li,Kuan-Chieh Huang,Yau-Hwang Kuo. 2011. Effective privacy protection scheme in cloud computing. ICACT.
  5. Rachna Arora, Anshu Parashar. 2013. Secure User Data in Cloud Computing Using Encryption Algorithms (IJERA) Vol. 3, Issue 4.
  6. Mandeep Kaur, Manish Mahajan. 2013. Using encryption Algorithms to enhance the Data Security in Cloud Computing. International Journal of Communication and Computer Technologies Volume 01 – No. 12, Issue: 03.
  7. ZiyuanWang . 2011. Security and privacy issues within the Cloud Computing? ,International Conference on Computational and Information Sciences.
  8. K. Sravani, , K. L. A. Nivedita . Effective Service Security Schemes In Cloud Computing". International Journal Of Computational Engineering Research (ijceronline. com) Vol. 3 Issue. 3
  9. S. Arnold. 2009. Cloud computing and issues of privacy.
  10. A Platform Computing Whitepaper. Enterprise Cloud Computing: Transforming IT. Platform Computing, pp6, 2010.
  11. Global Netoptex Incorporated. Demystifying the cloud. Important opportunities, crucial choices. , pp4-14. Available: http://www. gni. com [Dec. 13, 2009].
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Algorithms :aes des rsa