CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Data Security Mechanism for Cloud

Published on None 2011 by G. A. Patil., S. B. Patil.
International Conference on Emerging Technology Trends
Foundation of Computer Science USA
ICETT2011 - Number 2
None 2011
Authors: G. A. Patil., S. B. Patil.
f6ed93fa-39a4-41a2-b0ff-e0a72700ea21

G. A. Patil., S. B. Patil. . Data Security Mechanism for Cloud. International Conference on Emerging Technology Trends. ICETT2011, 2 (None 2011), 24-27.

@article{
author = { G. A. Patil., S. B. Patil. },
title = { Data Security Mechanism for Cloud },
journal = { International Conference on Emerging Technology Trends },
issue_date = { None 2011 },
volume = { ICETT2011 },
number = { 2 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 24-27 },
numpages = 4,
url = { /proceedings/icett2011/number2/3501-icett011/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Emerging Technology Trends
%A G. A. Patil.
%A S. B. Patil.
%T Data Security Mechanism for Cloud
%J International Conference on Emerging Technology Trends
%@ 0975-8887
%V ICETT2011
%N 2
%P 24-27
%D 2011
%I International Journal of Computer Applications
Abstract

Cloud computing is a means by which highly scalable services can be consumed over Internet and network on rental basis. Various cloud service providers are offering different services over cloud environment. Many big investors like Amazon S3, EC2, Microsoft Azure, IBM Blue, are providing cloud environments. When data is stored over cloud, vendors hold a limitless possibility to access this data. Social engineering done by cloud vendors or their employees would lead to information leak or even substantial loss of data. Commonly used authentication mechanism guarantee that authenticated users can access their data, but they do not guarantee security of data from the cloud vendor. This paper emphasizes on improving existing authentication mechanism & implementing data security schemes to secure data from the cloud vendor and other users of cloud.

References
  1. Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing, “Data Security Model for Cloud Computing”, ISBN 978-952-5726-06-0, Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009), Qingdao, China, November 21-22, 2009.
  2. Cong Wang, Qian Wang, and Kui Ren, “Ensuring Data Storage Security in Cloud Computing”.
  3. Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina Elaine Shi, Jessica Staddon “Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control” PARC Fujitsu Laboratories of America.
  4. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing”, ACM digital library.
  5. SIMENCE, time.lex “Multilevel authentication policy mapping”.
  6. ScottYilekUC, SanDiego Rescorla, Hovav Shacham Brandon Enright, UC San Diego “When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability”, ACM digital library.
  7. Benjamin Aziz, Alvaro Arenas, “A Secure and Scalable Grid-based Content Management System”, 2010 International Conference on Availability, Reliability and Security.
  8. Asoke K Talukder “Security & Scalability Architecture for Next Generation Internet Services” Geschickten Solutions Bangalore, India.
  9. Wassim Itani Ayman Kayssi Ali Chehab, “Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures”, 2009 Eighth IEEE International Conference on Dependable.
  10. Junaid Arshad, Paul Townend, Jie Xu, “Quantification of Security for Compute Intensive Workloads in Clouds”, 2009 15th International Conference on Parallel and Distributed Systems.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication by Characteristics (AC) Authentication by Knowledge (AK) Authentication by Ownership ( AO) Cloud Service Provider (CSP) Public Key Infrastructure (PKI) One Time Password (OTP)