CFP last date
20 May 2024
Reseach Article

Security of Data Storage in Cloud Computing

by Tania Gaur, Nisha Kharb
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 10
Year of Publication: 2015
Authors: Tania Gaur, Nisha Kharb
10.5120/19352-1023

Tania Gaur, Nisha Kharb . Security of Data Storage in Cloud Computing. International Journal of Computer Applications. 110, 10 ( January 2015), 15-18. DOI=10.5120/19352-1023

@article{ 10.5120/19352-1023,
author = { Tania Gaur, Nisha Kharb },
title = { Security of Data Storage in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 10 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number10/19352-1023/ },
doi = { 10.5120/19352-1023 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:46:00.131385+05:30
%A Tania Gaur
%A Nisha Kharb
%T Security of Data Storage in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 10
%P 15-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the advent of Information Technology in day-to-day activities, the need for online services such as storage space, software, platforms etc. is increasing rapidly. This lead to the rise of a new concept, the Cloud Computing. The Internet users rely heavily on the Cloud Computing for various computing resources. The main motive of the Cloud Providers is to provide these services in a virtualized manner. One of the main concern of cloud computing is the security of the Cloud Storage. When it comes to security of the data stored in the Cloud Storage, it is entirely in the hands of the Cloud Providers. The Cloud Providers assures the consumer of the Cloud that the data stored on their servers is safe. The consumer plays no role in securing the data. The various cloud providers claim that they provide highly secure cloud storage. But there have been attacks on hot-shot cloud providing companies such as Google, Salesforce. com and Dropbox[1]. Many cloud providers employee third party companies which has led to consumer losing their trust with these companies. Thus, the encryption techniques and the various security measures employed by the cloud providers should be equally strong. The privacy and security of cloud computing depend primarily on whether the provider has implement adequate and robust security controls as desired by the customer or not. In this paper we analyze the different security issues related to the cloud and different cryptographic algorithms to secure the cloud.

References
  1. Chou, Te-Shun. "Security Threats On Cloud Computing Vulnerabilities. "International Journal of Computer Science & Information Technology (IJCSIT) Vol 5 (2013).
  2. Mell, Peter, and Tim Grance. "The NIST definition of cloud computing. "National Institute of Standards and Technology 53. 6 (2009): 50.
  3. Khan, Miss Shakeeba S. , and Miss Sakshi S. Deshmukh. "Security in Cloud Computing Using Cryptographic Algorithms. " (2014).
  4. Hashemi, Sajjad. "DATA STORAGESECURITY CHALLENGESIN CLOUD COMPUTING. "
  5. Hubbard, Dan, and Michael Sutton. "Top Threats to Cloud Computing V1. 0. "Cloud Security Alliance (2010).
  6. Behrouz, A. Forouzan, and Mukhopadhay Debdeep. "Cryptography and network security. " McGramHill, International Edition (2008).
  7. Tirthani, Neha, and R. Ganesan. "Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography. " IACR Cryptology ePrint Archive 2014 (2014): 49.
  8. Somani, Uma, Kanika Lakhani, and Manish Mundra. "Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. " Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on. IEEE, 2010.
  9. Garg, Preeti, and Vineet Sharma. "An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function. " Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.
  10. Friedman, Allen A. , and M. Darrell. "West. Privacy and security in cloud computing. " Issues in Technology Innovation 3.
  11. Ashktorab, Vahid, and Seyed Reza Taghizadeh. "Security Threats and Countermeasures in Cloud Computing. " International Journal of application or Innovation in Engineering & Management (IJAIEM) 1. 2 (2012): 234-245.
  12. , Ankur, et al. "Cloud Computing Security. " International Journal on Recent and Innovation Trends in Computing and Communication 1. 1 (2013): 36-39.
  13. Padhy, Rabi Prasad, Manas Ranjan Patra, and Suresh Chandra Satapathy. "Cloud Computing: Security Issues and Research Challenges. " International Journal of Computer Science and Information Technology & Security (IJCSITS)1. 2 (2011).
  14. Kumar, Arjun, et al. "Secure storage and access of data in cloud computing. " ICT Convergence (ICTC), 2012 International Conference on. IEEE, 2012.
  15. Xiao, Zhifeng, and Yang Xiao. "Security and privacy in cloud computing. " Communications Surveys & Tutorials, IEEE 15. 2 (2013): 843-859.
  16. www. wikipedia. com
  17. Liu, Wentao. "Research on cloud computing security problem and strategy. " Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on. IEEE, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud security storage cryptography security issues.