CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Improved End to End System for Sharing and Managing Data in Cloud Storage

by Sumiti Joshi, Shiv Dubey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 4
Year of Publication: 2015
Authors: Sumiti Joshi, Shiv Dubey
10.5120/21216-3931

Sumiti Joshi, Shiv Dubey . An Improved End to End System for Sharing and Managing Data in Cloud Storage. International Journal of Computer Applications. 120, 4 ( June 2015), 20-24. DOI=10.5120/21216-3931

@article{ 10.5120/21216-3931,
author = { Sumiti Joshi, Shiv Dubey },
title = { An Improved End to End System for Sharing and Managing Data in Cloud Storage },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 4 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number4/21216-3931/ },
doi = { 10.5120/21216-3931 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:05:22.243950+05:30
%A Sumiti Joshi
%A Shiv Dubey
%T An Improved End to End System for Sharing and Managing Data in Cloud Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 4
%P 20-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is one of the emerging area in modern times. It is providing excellent facilities due to its adaptable infrastructure and features, but the issues related to trust management and security are key challenges in various applications. Whenever data or information is shared or transmitted from one host to another in cloud storage there is a need for security and trust assurances to prevent data from unauthorized hosts. In this article we present a survey which addresses the various challenges of cloud storage along with the different trust computation models to identify important research issues in the hotfoot growing area of computer technology. In order to resolve those issues the proposed methodology incorporates the trust evaluation and Digital Envelope techniques for preserving data against the un-trusted hosts and networks.

References
  1. Cloud Computing from IBM Link: http://www. ibm. com/cloud-computing/in/en/what-is-cloud-computing. html
  2. Cloud Computing Link from Webopedia: http://www. webopedia. com/TERM/C/cloud_computing. html
  3. Saini, S. , & Mann, D. (2014). Identity Management issues in Cloud Computing . arXiv preprint arXiv: 1406. 1033.
  4. Cloud Computing Link: https://www. salesforce. com/in/cloudcomputing/
  5. CSC Journal Link: http://www. cscjournals. org/manuscript/Journals/IJCN/volume3/Issue5/IJCN-176. pdf
  6. Ahmed, M. , Chowdhury, A. S. M. R. , Ahmed, M. , & Rafee, M. M. H. (2012). An advanced survey on cloud computing and state-of-the-art research issues. IJCSI International Journal of Computer Science Issues, 9(1), 1694-0814.
  7. Boopathy, D. , & Sundaresan, M. (2015, January). Enhanced Encryption and Decryption Gateway Model for Cloud Data Security in Cloud Storage, In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2 (pp. 415-421). Springer International Publishing.
  8. Li, M. , Jia, W. , Guo, C. , & Zhang, L. (2015, January). Encrypted Searching with Adaptive Symmetric Searchable Encryption Security in Cloud Storage. In 2015 International Symposium on Computers & Informatics. Atlantis Press.
  9. Shetty, J. , Anala, M. R. , & Shobha, G. (2015). An Approach to Secure Access to Cloud Storage Service. International Journal of Research, 2(1), 364-368.
  10. Cloud Storage Link: http://www. cs. cityu. edu. hk/~congwang/images/storage. jpg
  11. Badhe, M. V. , & Ramteke, P. L. (2015). A Survey on Privacy-Preserving Public Auditing for Secure Cloud Storage Using Third Party Auditor.
  12. Li, W. , & Ping, L. (2009). Trust model to enhance security and interoperability of cloud environment. In Cloud Computing (pp. 69-79). Springer Berlin Heidelberg.
  13. Habib, S. M. , Ries, S. , & Muhlhauser, M. (2011, November), Towards a trust management system for cloud computing, In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on (pp. 933-939). IEEE.
  14. Muchahari, M. K. , & Sinha, S. K. (2012, December), A New trust management architecture for cloud computing environment, In Cloud and Services Computing (ISCOS), 2012 International Symposium on (pp. 136-140). IEEE.
  15. Messina, F. , Pappalardo, G. , Rosaci, D. , Santoro, C. , & Sarné, G. M. (2013), A trust-based approach for a competitive cloud/grid computing scenario, In Intelligent Distributed Computing VI (pp. 129-138). Springer Berlin Heidelberg.
  16. Pawar, P. S. , Rajarajan, M. , Dimitrakos, T. , & Zisman, A. (2014). Trust Assessment Using Cloud Broker. In Trust Management VIII (pp. 237-244). Springer Berlin Heidelberg.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Security Trust Management Digital Envelope AES Encryption.