CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Digital Signature based Improved SECO Environment to Enhance Data Security in Cloud Computing

by Swaranjeet Kaur, Amritpal Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 11
Year of Publication: 2015
Authors: Swaranjeet Kaur, Amritpal Kaur
10.5120/ijca2015905574

Swaranjeet Kaur, Amritpal Kaur . Digital Signature based Improved SECO Environment to Enhance Data Security in Cloud Computing. International Journal of Computer Applications. 123, 11 ( August 2015), 8-12. DOI=10.5120/ijca2015905574

@article{ 10.5120/ijca2015905574,
author = { Swaranjeet Kaur, Amritpal Kaur },
title = { Digital Signature based Improved SECO Environment to Enhance Data Security in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 11 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number11/22001-2015905574/ },
doi = { 10.5120/ijca2015905574 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:24.874583+05:30
%A Swaranjeet Kaur
%A Amritpal Kaur
%T Digital Signature based Improved SECO Environment to Enhance Data Security in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 11
%P 8-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing itself is as a Service Model which means that everything is available on-demand over the internet. Every type of resources such as hardware and software resources can be accessed from anywhere by just connecting any network device to the internet. As it is based on internet services, security becomes major issue in this. Number of algorithms has been introduced to make secure user’s outsourced data on cloud. To solve this security issue, a secure and efficient data collaboration scheme SECO was introduced in cloud computing. This scheme resolves the security issue at a large extent but security needs to be enhanced more as security in itself is a vast area for research. In this paper, a Secure SECO Technique is proposed. The purpose of this technique is to enhance security by implementing digital signatures scheme in SECO scheme. This proposed technique helps to maximize the security of user’s outsourced data on cloud.

References
  1. Mohsin Nazir, “Cloud Computing: Overview & Current Research Challenges”, IOSR Journal of Computer Engineering (IOSR-JCE), ISSN 2278-0661, Vol. 8, Issue 1, pp. 14-22, 2012.
  2. Remya Rajan, “Efficient and Privacy Preserving Multi User Keyword Search for Cloud Storage Services”, International Journal of Advanced Technology & Engineering Research (IJATER), ISSN 2250-3536, Vol. 2, Issue 4, pp. 48-51, July 2012.
  3. Ashalatha R, “A Survey on Security as a Challenge in Cloud Computing”, International Journal of Advanced Technology & Engineering Research (IJATER), ISSN 2250-3536, Vol. 2, Issue 4, pp. 1-4, July 2012.
  4. Shobha Rajak, Ashok Verma, “Secure Data Storage in the Cloud using Digital Signature Mechanism”, International Journal of Advanced Research in Computer Engineering & Technology, ISSN 2278 – 1323, Vol. 1, Issue 4, pp. 489-493, June 2012.
  5. Abhinay B.Angadi, Akshata B.Angadi, Karuna C.Gull, “Security Issues with Possible Solutions in Cloud Computing-A Survey”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN 2278-1323, Vol. 2, Issue 2, pp. 652-661, Feb 2013.
  6. Shashank Bajpai, Padmija Srivastava, “A Fully Homomorphic Encryption Implementation on Cloud Computing”, International Journal of Information & Computation Technology (IJICT), ISSN 0974-2239, Vol. 4, No. 8, pp. 811-816, 2014.
  7. Akshay A. Pawle, Vrushsen P. Pawar, “Face Recognition System (FRS) on Cloud Computing for User Authentication”, International Journal of Soft Computing and Engineering (IJSCE), ISSN 2231-2307, Vol. 3, Issue-4, pp. 189-192, September 2013.
  8. Xin Dong, Jiadi Yu, Yuan Luo, “Achieving Secure and Efficient Data Collaboration in Cloud Computing”, Vol. 978-1-4799-0590-4/13/$31.00 ©2013 IEEE.
  9. Sunita Rani, Ambrish Gangal, “Cloud Security with Encryption using Hybrid Algorithm and Secured Endpoints”, International Journal of Computer Science and Information Technologies (IJCSIT), ISSN 0975-9646, Vol. 3, No. 3, pp. 4302 – 4304, 2012.
  10. D.H. Patil, Rakesh R. Bhavsar and Akshay S. Thorve, “Data Security over Cloud”, International Conference on Emerging Frontiers in Technology for Rural Area (EFITRA) , Proceedings published in International Journal of Computer Applications® (IJCA), pp. 11-14, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing SECO environment Secure SECO environment Certification Authority Digital Certificates and Security Analysis.