CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing

by Rimmy Chuchra, R.k Seth
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 7
Year of Publication: 2015
Authors: Rimmy Chuchra, R.k Seth
10.5120/19989-1619

Rimmy Chuchra, R.k Seth . Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing. International Journal of Computer Applications. 114, 7 ( March 2015), 12-17. DOI=10.5120/19989-1619

@article{ 10.5120/19989-1619,
author = { Rimmy Chuchra, R.k Seth },
title = { Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 7 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number7/19989-1619/ },
doi = { 10.5120/19989-1619 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:52:04.440320+05:30
%A Rimmy Chuchra
%A R.k Seth
%T Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 7
%P 12-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security during data transmission in cloud computing using TBDSA (Token Based Data Security Algorithm) along with its implementation is presented in this paper. The auto-generated token based certificate activation approach with SSL (Secure Socket Layer) provides the appropriate collaboration between the cloud client and the cloud service provider, so that user may become confident during data transfer by utilizing various cloud applications and services. The chances of attacks may be reduced by implementing this TBDSA. This designed algorithm takes less time to execute and increases the performance of the system.

References
  1. Rashminigoti and Dr. Shailendra singh, 2013. A survey of cryptographic algorithm for cloud computing, International journal of emerging trends and computer application systems.
  2. Leenakhanna and Dr. AmantJaiswal March-2013, Cloud computing: Security issues and description of encryption based algorithm to overcome them, International journal of advanced research in computer science and software engg.
  3. Manpreetkaur and Rajbir Singh May-2013, implementing encryption algorithm to enhance data security in cloud computing, International journal of computer application.
  4. M. Vijayapriya Sept-2013, Security algorithm in cloud computing: Overview, International journal of computer science and emerging technology.
  5. Dr. M. M andA. Hasham 2012. A new user authentication file encryption & distributed server based cloud computing security architecture, International journal of advanced computer science and applications.
  6. T. Sivasakthi and Dr. Prabakarn Feb-2014. Applying digital signature with encryption algorithm of user authentication for data security in cloud computing, International journal of innovative research in computer and communication engg.
  7. Chimerebarron and huimingYu WCE-2013. Cloud computing security case studies and research, proceeding of the world congress on engg,London, U. K.
  8. N. Saravanan andA. Mahendiran 2012. Implementation of RSA algorithm in google cloud using SQL cloud, Research journal of applied sciences, Engg. & technology.
  9. Nehajain and gurpreetkaur 2012. Implementing DES algorithm in cloud for data security, International journal of computer science and information technology.
  10. Sanjoli single and jasmeetsingh 2013. Implementing cloud data security by encryption using rijndaelalgorithm,Global journal of computer science and technology cloud and distributed.
  11. Prakash G. L and Dr. Manishparteek April-2013. Data encryption and decryption algorithm using key rotations for data security in cloud computing, International journal of engg. And computer science.
  12. Kevin Hamle, Murat kantarcioglu, Latifur khan and bhavanithuraisingham April-June-2010. Security issues for cloud computing, International journal of information security and privacy.
  13. Anjanachaudhry and ravinderthakur Dec-2013. A review: Data security approach in cloud computing by using RSA algorithm, International journal of advance research in computer science and management studies.
  14. V. S Rajudue,. N. Prasanthi and A. Jagadeesh Dec-2013. A study of algorithm used to secure data processing in cloud computing, International journal of computer science and technology.
  15. Kashifmunir and Dr. SellapanPalaniappan, April-2013, Framework for cloud computing, International journal on cloud computing: Services and architecture.
  16. P. Shubshri and A. Padmapriya July-2013. Implementation of reverse Caesar cipher algorithm for cloud computing, International journal of computer trends and technology.
  17. RimmyChuchra Oct-2012. Data security in cloud computing, International Journal of societal applications of computer science.
  18. R. K Seth and RimmyChuchra March-April-2014. TBDSA- A new data security algorithm in cloud computing, International journal of computer science and information technology.
Index Terms

Computer Science
Information Sciences

Keywords

Security algorithm digital signature secure socket layer.