Call for Paper - September 2017 Edition
IJCA solicits original research papers for the September 2017 Edition. Last date of manuscript submission is August 21, 2017. Read More

The Comprehensive Approach for Data Security in Cloud Computing: A Survey

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 39 - Number 18
Year of Publication: 2012
Authors:
Nilesh N. Kumbhar
Virendrasingh V. Chaudhari
Mohit A.Badhe
10.5120/5080-7433

Nilesh N Kumbhar, Virendrasingh V Chaudhari and Mohit A.Badhe. Article: The Comprehensive Approach for Data Security in Cloud Computing: A Survey. International Journal of Computer Applications 39(18):23-29, February 2012. Full text available. BibTeX

@article{key:article,
	author = {Nilesh N. Kumbhar and Virendrasingh V. Chaudhari and Mohit A.Badhe},
	title = {Article: The Comprehensive Approach for Data Security in Cloud Computing: A Survey},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {39},
	number = {18},
	pages = {23-29},
	month = {February},
	note = {Full text available}
}

Abstract

Cloud Computing is becoming next stage platform in the evolution of the internet. It provides the customer an enhanced and efficient way to store data in the cloud with different range of capabilities and applications. The data in the cloud is stored by the service provider. Service provider capable and having a technique to protect their client data to ensure security and to prevent the data from discloser by unauthorized users. This paper, will gives a descriptive knowledge regarding cloud computing privacy and security issue provided by encryption and decryption services. If a cloud system is performing a task of storage of data and encryption and decryption of data on the same cloud then there are much more chances of getting access to the confidential data without authorization. This increases the risk factor in terms of security and privacy. This paper helps us on proposes a business model for cloud computing which focused on separating the encryption and decryption service, from the storage service provided by service provider. I means that both encryption and decryption of the data can performed at two distinct places. For studying this proposal are using a business model named as CRM (customer relationship model) for an example. For the evaluation of effective an efficient technique of data storage and retrieval we are providing three clouds separately such as including encryption and decryption services, secondly storage and a CRM application system. In this Research paper, we have tried to access separate encryption and decryption service using RSA algorithm and computing is a paradigm in which information is stored in servers on the internet. That information retrieved by the client as per usage. For this manner, we provide us a solution for data security, confidentiality and privacy based on a concept of separate encryption and decryption service.

References

  • Cloud Computing FOR DUMMIES by Judith Hurwitz, RobinBloor, Marcia Kaufman, and Fern Halper. WILEY INDIA EDITION.
  • Peter Mell, and Tim Grance, “Draft NIST Working Definition of Cloud Computing,” 2009, from http://csrc.nist.gov/groups/SNS/cloud-computing
  • Sales force Customer Relationships Management (CRM) system, http://www.salesforce.com/
  • Amazon EC2 and S3, Online at http://aws.amazon.com/
  • Google App Engine, Online at http://code.google.com/appengine/
  • B. R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,”in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520, September 2009.
  • N. Hawthorn, “Finding security in the cloud,” Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
  • Salesforce.com, Inc., “Force.com platform,” Retrieved Dec. 2009, from http://www.salesforce.com/tw
  • SAP AG., “SAP services: maximize your success,” Retrieved Jan. 2010, From http://www.sap.com/services/index.epx
  • A. Parakh and S. Kak, “Online data storage using implicit security”, Information Sciences, vol. 179, issue 19, pp. 3323-3333 ,September 2009
  • Delivering and implementing a secure infrastructure. Pete boden and mark estberg online services security and compliance Microsoft Corporation.
  • Nasuni, data storage: www.nasuni.com