CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Review of Implicit Security Mechanisms for Cloud Computing

by Makhan Singh, Sarbjeet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 17
Year of Publication: 2014
Authors: Makhan Singh, Sarbjeet Singh
10.5120/18613-9878

Makhan Singh, Sarbjeet Singh . Review of Implicit Security Mechanisms for Cloud Computing. International Journal of Computer Applications. 106, 17 ( November 2014), 24-28. DOI=10.5120/18613-9878

@article{ 10.5120/18613-9878,
author = { Makhan Singh, Sarbjeet Singh },
title = { Review of Implicit Security Mechanisms for Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 17 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number17/18613-9878/ },
doi = { 10.5120/18613-9878 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:40.553904+05:30
%A Makhan Singh
%A Sarbjeet Singh
%T Review of Implicit Security Mechanisms for Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 17
%P 24-28
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has been drawing the interest from industry but there are still many issues that are in their primitive stage which are hampering the growth of cloud. One of these issues is security of data stored in the servers of datacenters of cloud service providers. Many schemes have been developed till date for ensuring security of data in distributed systems. In this paper implicit security using information dispersal and secret sharing algorithms have been reviewed which provides data security, reliability and availability of information.

References
  1. Foster, I. , Zhao, Y. , Raicu, I. , & Lu, S. (2008, November). Cloud computing and grid computing 360-degree compared. In Grid Computing Environments Workshop, 2008. GCE'08 (pp. 1-10). IEEE.
  2. Fox, A. , Griffith, R. , Joseph, A. , Katz, R. , Konwinski, A. , Lee, G. , . . . & Stoica, I. (2009). Above the clouds: A Berkeley view of cloud computing. Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS, 28, 13.
  3. Buyya, R. , Yeo, C. S. , Venugopal, S. , Broberg, J. , & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616
  4. Mell, P. , & Grance, T. (2009). The NIST definition of cloud computing. National Institute of Standards and Technology, 53(6), 50.
  5. Miller, M. (2008). Cloud computing: Web-based applications that change the way you work and collaborate online. Que publishing.
  6. Rimal, B. P. , Choi, E. , & Lumb, I. (2009, August). A taxonomy and survey of cloud computing systems. In INC, IMS and IDC, 2009. NCM'09. Fifth International Joint Conference on (pp. 44-51). IEEE.
  7. Seiger, R. , Groß, S. , & Schill, A. (2011, September). SecCSIE: a secure cloud storage integrator for enterprises. In Commerce and Enterprise Computing (CEC), 2011 IEEE 13th Conference on (pp. 252-255). IEEE.
  8. Garay, J. A. , Gennaro, R. , Jutla, C. , & Rabin, T. (2000). Secure distributed storage and retrieval. Theoretical Computer Science, 243(1), 363-389.
  9. Krawczyk, H. (1993, September). Distributed fingerprints and secure information dispersal. In Proceedings of the twelfth annual ACM symposium on Principles of distributed computing (pp. 207-218). ACM.
  10. A. De Santis and B. Masucci. (2002). On information dispersal algorithms. In Proceedings of IEEE International Symposium on Information Theory, (410). IEEE.
  11. Rabin, M. O. (1989). Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM (JACM), 36(2), 335-348.
  12. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612-613.
  13. Parakh, A. , & Kak, S. (2010, May). A tree based recursive information hiding scheme. In Communications (ICC), 2010 IEEE International Conference on (pp. 1-5). IEEE.
  14. Parakh, A. , & Kak, S. (2009). Online data storage using implicit security. Information Sciences, 179(19), 3323-3331.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Security Information Dispersal Secret Sharing Explicit Security Implicit Security