Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

Three Level Cloud Computing Security Model

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 119 - Number 2
Year of Publication: 2015
Authors:
Pooja Sharma
Rajkumar Singh Rathore
10.5120/21042-3656

Pooja Sharma and Rajkumar Singh Rathore. Article: Three Level Cloud Computing Security Model. International Journal of Computer Applications 119(2):29-33, June 2015. Full text available. BibTeX

@article{key:article,
	author = {Pooja Sharma and Rajkumar Singh Rathore},
	title = {Article: Three Level Cloud Computing Security Model},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {119},
	number = {2},
	pages = {29-33},
	month = {June},
	note = {Full text available}
}

Abstract

Cloud Computing is the next generation technology that describes the development of many existing technologies and approaches to computing into something different. Cloud enhances agility, scaling, and availability, and provides the potential for cost reduction through optimized and efficient computing[1]. Cloud Computing has the potential to change the nature of Information and Communication Technology (ICT) provision in the public service and significantly reduce costs[1]. It is a key element of strategic future of ICT in this sector. Cloud Computing services are delivered by any third party provider who has its own infrastructure. As cloud is a collection of super computers which are spread all over the world, hence authorization and authentication are extremely necessary. This paper proposes a methodology to over come the security threats that can take place on three levels i. e login authentication, network security and Storage Security. We have built an Email system to provide security on all three levels. Firstly, user authentication is done so that an unauthorized user cannot tamper the data of authorized user. Secondly, when the user wants to check its inbox, then he is supposed to enter the passcode i. e Storage Security via RC4 is done. Thirdly, while sending a mail to someone through network is done with the help of AES (Advanced Encryption Standard). Hence, the integrity and confidentiality of data saved in inbox or mailed to another user is ensured by not only encrypting but also providing access to data only on successful authentication.

References

  • Jaydip Sen, Innovation Labs, Tata Consultancy Services Ltd. , Kolkata, Security and Privacy Issues in Cloud Computing.
  • Dimitrios Zissis?, Dimitrios Lekkas, Addressing cloud computing security issues, journal homepage: www. elsevier. com/locate/fgcs, Future Generation Computer Systems
  • Rajkumar Chalse, Ashwin Selokar 2013 5th International Conference on Computational Intelligence and Communication Networks, A New Technique of Data Integrity for Analysis of the Cloud Computing Security.
  • R. H. Sakr1, F. Omara2, O. Nomir3, May-June 2014, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), An Optimized Technique for Secure Data Over Cloud OS.
  • Abha Sachdev, Mohit Bhansali, April 2013,International Journal of Computer Applications ,Enhancing Cloud Computing Security using AES Algorithm.
  • Debajyoti Mukhopadhyay, Gitesh Sonawane, Parth Sarthi Gupta, Sagar Bhavsar, Vibha Mittal, Enhanced Security for Cloud Storage using File Encryption.
  • Smriti*, Dr. Deepak Arora**,Jul-Aug 2013, International Journal of Engineering Research and Applications, Ensuring Data Security for Secure Cloud Hybrid Framework.
  • Bhagyashri C. Allagi , Dr. R. B. Kulkarni, Shashikant Hippargi,November 2013,International Journal of Advanced Research in Computer Science and Software Engineering, Cloud Computing for Media Storage and Performance Analysis.
  • Prof Swarnalata Bollavarapu, Bharat Gupta, March 2014, International Journal of Advanced Research in Computer Science and Software Engineering, Data Security in Cloud Computing.
  • Vijay. G. R, A. Rama Mohan Reddy,International Journal of Soft Computing and Engineering (IJSCE),Data Security in Cloud based on Trusted Computing Environment.
  • T. Saravanan, 1 2G. Saritha and 3R. Udayakumar, 2014, Middle-East Journal of Scientific Research, Secure and Trustworhty Data Storage in Cloud Computing.
  • Uma Naik1, V. C. Kotak2, Feb. 2014 OSR Journal of Electronics and Communication Engineering (IOSR-JECE),Security Issues with Implementation of RSA and Proposed Dual Security Algorithm for Cloud Computing.
  • Zhang Xin, Lai Song-qing, Liu Nai-wen, 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION, Research on Cloud Computing Data Security Model Based on Multi-dimension.
  • Keiko Hashizume1*, David G Rosado2, Eduardo Fernández-Medina2 and Eduardo B Fernandez1, Journal of Internet Services and Applications 2013, An analysis of security issues for cloud computing.