Open Access   Article Go Back

SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES

avitha K1 , Saravanan V2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-08 , Page no. 34-39, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si8.3439

Online published on Oct 31, 2018

Copyright © Kavitha K, Saravanan V . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kavitha K, Saravanan V, “SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.08, pp.34-39, 2018.

MLA Style Citation: Kavitha K, Saravanan V "SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES." International Journal of Computer Sciences and Engineering 06.08 (2018): 34-39.

APA Style Citation: Kavitha K, Saravanan V, (2018). SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES. International Journal of Computer Sciences and Engineering, 06(08), 34-39.

BibTex Style Citation:
@article{K_2018,
author = {Kavitha K, Saravanan V},
title = {SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {06},
Issue = {08},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {34-39},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=472},
doi = {https://doi.org/10.26438/ijcse/v6i8.3439}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.3439}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=472
TI - SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES
T2 - International Journal of Computer Sciences and Engineering
AU - Kavitha K, Saravanan V
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 34-39
IS - 08
VL - 06
SN - 2347-2693
ER -

           

Abstract

Cloud computing is information technology (IT) model that allows the ubiquitous access to shared pools of configurable system resources and higher-level services provisioned with lesser effort. Cloud computing provides number of advantages in information technology. Cloud storage is an essential service of cloud computing that are prevalent as it present low-cost and on-demand utilization of large storage and processing resources. Security is an essential barrier to comprehensive prevalence of cloud computing. Security is mainly prioritized portion for any cloud computing environment during data storage and data transaction. Cloud computing approach is linked with users sensitive data stored both at client’s end and cloud servers. For improving the security level, authentication techniques are used for allowing the authenticated user to access the data. But, complexity of the security is high when decentralization of data over the wide area of network. In addition, existing methods failed to improve the authentication accuracy and data confidentiality. Our main objective of the work is to improve the security level during the data storage and data transaction by using cryptosystem techniques.

Key-Words / Index Term

Cloud computing, ubiquitous, security, data confidentiality, data transaction, data storage

References

[1] Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen and Jin Liu “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, IEEE Transactions on Services Computing, Volume 10, Issue 5, September-October 2017, Pages 701 – 714
[2] Geeta Sharma and Sheetal Kalra, “Identity based secure authentication scheme based on quantum key distribution for cloud computing”, Peer-to-Peer Networking and Applications, Springer, Volume 11, Issue 2, March 2018, Pages 220–234
[3] Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu and Yang Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”, IEEE Transactions on Computers, Volume 65, Issue 6, June 2016, Pages 1992 – 2004
[4] Sheren A. El-Booz, Gamal Attiya and Nawal El-Fishawy, “A secure cloud storage system combining time-based one-time password and automatic blocker protocol”, EURASIP Journal on Information Security, Springer, Volume 13, December 2016, Pages 1-13
[5] Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu and Yi Mu, “EACSIP: Extendable Access Control System with Integrity Protection for Enhancing Collaboration in the Cloud”, IEEE Transactions on Information Forensics and Security, Volume 12, Issue 12, December 2017, Pages 3110 – 3122
[6] Ruhul Amin, Neeraj Kumar, G.P. Biswas, R. Iqbal and Victor Chang, “A Light Weight Authentication Protocol for IoT-enabled Devices in Distributed Cloud Computing Environment”, Future Generation Computer Systems, Elsevier, Volume 78, Part 3, January 2018, Pages 1005-1019
[7] Yong Yu, Man Ho Au Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min, “Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage”, IEEE Transactions on Information Forensics and Security, Volume 12, Issue 4, April 2017, Pages 767 – 778
[8] Nesrine Kaaniche and Maryline Laurent, “Data Security and Privacy preservation in Cloud Storage Environments based on Cryptographic Mechanisms”, Computer Communications, Elsevier, Volume 111, 1 October 2017, Pages 120-141
[9] Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu and Jin Li, “Fine-grained Two-factor Access Control for Web-based Cloud Computing Services”, IEEE Transactions on Information Forensics and Security, Volume 11, Issue 3, March 2016, Pages 484 – 497
[10] Mazhar Ali, Saif U. R. Malik and Samee U. Khan, “DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party”, IEEE Transactions on Cloud Computing, Volume 5, Issue 4, October-December 2017, Pages 642 – 655