Open Access   Article Go Back

A Survey Paper on Data security in Cloud Computing

Sajjan R.S.1 , Vijay Ghorpade2 , Vishvajit Dalimbkar3

Section:Survey Paper, Product Type: Conference Paper
Volume-04 , Issue-04 , Page no. 9-13, Jun-2016

Online published on Jun 29, 2016

Copyright © Sajjan R.S., Vijay Ghorpade , Vishvajit Dalimbkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sajjan R.S., Vijay Ghorpade , Vishvajit Dalimbkar, “A Survey Paper on Data security in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.04, pp.9-13, 2016.

MLA Style Citation: Sajjan R.S., Vijay Ghorpade , Vishvajit Dalimbkar "A Survey Paper on Data security in Cloud Computing." International Journal of Computer Sciences and Engineering 04.04 (2016): 9-13.

APA Style Citation: Sajjan R.S., Vijay Ghorpade , Vishvajit Dalimbkar, (2016). A Survey Paper on Data security in Cloud Computing. International Journal of Computer Sciences and Engineering, 04(04), 9-13.

BibTex Style Citation:
@article{R.S._2016,
author = {Sajjan R.S., Vijay Ghorpade , Vishvajit Dalimbkar},
title = {A Survey Paper on Data security in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {04},
Issue = {04},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {9-13},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=95},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=95
TI - A Survey Paper on Data security in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Sajjan R.S., Vijay Ghorpade , Vishvajit Dalimbkar
PY - 2016
DA - 2016/06/29
PB - IJCSE, Indore, INDIA
SP - 9-13
IS - 04
VL - 04
SN - 2347-2693
ER -

           

Abstract

Cloud computing is group of services for example software system storage, network and hardware these type of services are provided to user. Cloud storage is easily access anywhere anytime of the data because cloud is work in remote location. It uses the storage service provided by the cloud provider. Data is not secure in the cloud because the unauthorized user can try to use of the private data. So providing the data security it uses the different encryption method to protect the data. So that in the proposed study it use the multilevel encryption algorithm. In the multilevel encryption it combines two different algorithms for providing the better security.

Key-Words / Index Term

Component; Cloud Computing,Data Security,Encryption Algorithm

References

[1] P. Mell and T. Grance, The NIST Definition of Cloud Computing, version 15, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov).
[2] Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (83-85), Jul -2014, E-ISSN: 2347-2693
[3] Sandha, M.Ganaga Durga,” Study on Data Security Mechanism in Cloud Computing”,IEEE conference no-33344.
[4] William Stallings, Cryptography and Network Security: Principles and Practices, Fifth edition, Prentice Hall, ISBN-13: 978- 0136097044, 2010.
[5] Balachandra Reddy Kandukuri, Rama Krishna Paturi and Dr. AtanuRakshit, “C loud security issues” In Services Computing, 2009. IEEE International Conference on, page 517520, 2009.
[6] Neha Jain and Gurpreet Kaur ‘Implementing DES Algorithm in Cloud for Data Security” VSRD International Journal of CS & IT Vol. 2 Issue 4, pp. 316-321, 2012.
[7] Amazon Web Services: Overview of Security Processes, may 2011.
[8] L. M. Kaufman, "Data security in the world of cloud computing,"IEEE Security & Privacy Magazine, vol. 7, pp. 61-64, July2009.
[9] P.Shanthi Bala,” Intensification of Educational Cloud Computing and Crisis of Data Security in Public Clouds”,IJCSE Vol. 02, No. 03, 2010, 741-745.
[10] K Hashizume et al., An analysis of security issues for cloud computing, Journal of Internet Services and Applications, a Springer open journal, pp 1-13, 2013.
[11] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka,and J. Molina. Controlling data in the cloud: Outsourcing computation without outsourcing control. pages 85–90, 2009
[12] Wang, J.K.; Xinpei Jia, Data Security and Authentication in hybrid cloud computing model, Global High Tech Congress on Electronics (GHTCE), 2012 IEEE, On page(s): 117-120.
[13] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013.
[14] K. Dubey, M. Namdev, S. Shrivastava, “Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment”, IEEE sixth international conference, 2012.
[15] Prakash G. L , Dr. Manish Prateek, Dr Inder Singh, ,“Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques ”,IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India