CFP last date
20 May 2024
Reseach Article

Survey Paper on Encryption, Authentication and Auditing Services for better Cloud Security

by Aishwarya Gupta, Vishwajeet Pattanaik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 10
Year of Publication: 2016
Authors: Aishwarya Gupta, Vishwajeet Pattanaik
10.5120/ijca2016908978

Aishwarya Gupta, Vishwajeet Pattanaik . Survey Paper on Encryption, Authentication and Auditing Services for better Cloud Security. International Journal of Computer Applications. 138, 10 ( March 2016), 33-37. DOI=10.5120/ijca2016908978

@article{ 10.5120/ijca2016908978,
author = { Aishwarya Gupta, Vishwajeet Pattanaik },
title = { Survey Paper on Encryption, Authentication and Auditing Services for better Cloud Security },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 10 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number10/24418-2016908978/ },
doi = { 10.5120/ijca2016908978 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:21.336966+05:30
%A Aishwarya Gupta
%A Vishwajeet Pattanaik
%T Survey Paper on Encryption, Authentication and Auditing Services for better Cloud Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 10
%P 33-37
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data Storage Security is matter of concern especially in the field of Cloud Computing where large amount of data is being stored on daily basis over the internet. But the real world is facing some or other challenging issues regarding the same. An ubiquitous and an on-demand access with an interoperable network of your various computing resources and sharing necessary information is the need of this Internet dependent Earth, which has led the generation of Cloud and the virtual world related to it. As the number of users and data over the net are getting increased second by second there is a need of system or method which could hold this with all its privacy, integrity and confidentiality. But the vulnerabilities over Cloud data are weakening the expected progress of the field. Many complex encryption and decryption techniques are being introduced but the new risks get generated. The organisation at every level is concerned with privacy of the data and various attacks which don’t enable them to use the Cloud’s benefits and its susceptibility over the data holds the technology to grow. Some trustworthy and dependable Cloud storage will be a good option with the specific authentication as well as proper agreements and auditing protocols defines earlier itself will motivate the people to be secure and tension free while storing the data over the Cloud.

References
  1. C. Wang, Q. Wang, K. Ren, N.Cao and W. Lou, “Towards Secure and Dependable data storage services in Cloud computing”, in Proc. of IWQoS’09, July 2009.
  2. Sunita Sharma, Amit Chugh, ”Survey Paper on Cloud Storage Security”, IJIRCCE, Vol.1, Issue 2, April 2013, ISSN (online): 2320-9801.
  3. Ganesh Mouli Bandari, N. Subhash Chandra, V.Krishna, “Secure Cloud Storage through Public Auditing and Cryptographic Primitives”, IJCTT-Vol.15, Number 2 – Sep 2014, ISSN: 2231-2803.
  4. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in Cloud computing”, in Proc. of IWQoS’09, July 2009, pp. 1–9.
  5. Parsi Kalpana ,” Data Security in Cloud Computing using RSA Algorithm”, International Journal of Research in Computer and Communication technology, IJRCCT, ISSN:2278-5841, Vol 1, Issue 4, September 2012.
  6. Mr. Kailash Patidar ,Mr. Ravindra Gupta ,Prof. Gajendra Singh ,Ms.Megha Jain ,Ms.Priyanka Shrivastava, “ Integrating the Trusted Computing Platform into the Security of Cloud Computing System”, IJARCSSE, Vol.2, Issue 2, Feb 2012, ISSN: 2277 128X.
  7. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest”, in Proc. of HotOS’07. Berkeley, CA, USA: USENIX Association, 2007, pp. 1–6.
  8. Subedari Mithila, P. Pradeep Kumar, ”Data Security through Confidentiality in Cloud Computing Environment”, Subedari Mithila, IJCSIT, Vol. 2, ISSN: 1836-1840, 2011.
  9. Mehdi Hojabri, ”Ensuring data storage security in Cloud computing with effect of Kerberos”, Vol. 1 Issue 5, July – 2012, ISSN: 2278- 01 81.
  10. M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving audit and extraction of digital contents”, Cryptology ePrint Archive, Report 2008/186, 2008, http://eprint.iacr.org/.
  11. S. Berger, R. C´aceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, “Virtualizing the trusted platform module”, In Proc. of USENIX-SS’06, Berkeley, CA, USA, 2006.
  12. V. Sandhya, “A Study on Various Security Methods in Cloud Computing”, IJARCS, Vol. 2, No.6, Nov-Dec 2011.
  13. Balakrishnan.S , Saranya.G, Shobana.S, Karthikeyan.S, “Introducing effective Third Party Audting for data storage security in Cloud Computing”, IJCST Vol.2, Issue 2, June 2011, ISSN: 0976-8491.
  14. Abha Sachdev and Mohit Bhansali, “Enhancing Cloud Computing Security using AES Algorithm”, IJCA, ISSN: 0975 – 8887, Vol. 67– No.9, April 2013.
  15. John Harauz, Lori M. Kaufman and Bruce Potter, “Data security in the world of Cloud computing”, 2009 IEEE Co Published by the IEEE Computer and Reliability Societies.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Storage Security Encryption as well as Decryption Algorithms Trusted Storage Platform Kerberos Third Party Auditor.