Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Authentication based Hybrid Security Method for Securing Data in Cloud Environment

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Sanjivani Patwa, Jayram Dwivedi
10.5120/ijca2016909202

Sanjivani Patwa and Jayram Dwivedi. Article: Authentication based Hybrid Security Method for Securing Data in Cloud Environment. International Journal of Computer Applications 139(7):27-31, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Sanjivani Patwa and Jayram Dwivedi},
	title = {Article: Authentication based Hybrid Security Method for Securing Data in Cloud Environment},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {139},
	number = {7},
	pages = {27-31},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

With the modern use of services of the cloud computing, the users need higher security. Therefore safety of the cloud computing is a first consideration of the users to select. In the establishment of the cloud computing, application proportion of the virtualization increases gradually, scope and the depth of safety also expanded gradually. The associated concepts of the cloud computing and its establishment conditions are discussed in this paper. In this paper the foundation of the international-certification-institute is suggested for service providing companies to raise the trust and improve the likeliness of utilizing this advance and valuable technique among the people. If the security is not fixed and powerful, then the flexibility and the benefits that a cloud computing has to provide will have the few prospect. This will facilitates the researchers and the security professionals to understand about the users concerns and the vendors concerns and the critical analysis regarding the various research types suggested.

References

  1. Yashpal Kadam, “Security Issues in Cloud Computing A Transparent View”, International Journal of Computer Science & Emerging Technologies, Vol-2 No 5 October, 2011.
  2. Mohamed Al Morsy, John Grundy and Ingo Müller, “An Analysis of The Cloud Computing Security Problem”, In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 Nov 2010.
  3. H. Takabi, J.B.D. Joshi, G.Ahn., “Security and Privacy Challenges in Cloud Computing Environments”, IEEE Security Privacy Magazine, Vol 8, IEEE Computer Society, p.24-31, 2010.
  4. Petre, R. (2012). Data mining in Cloud Computing. Database Systems Journal, 3(3), 67-71.
  5. Ogigau-Neamtiu, F. (2012). Cloud Computing Security Issues. Journal of Defense Resource Management, 3(2), 141-148.
  6. M. Monsef, N. Gidado, “Trust and privacy concern in the Cloud”, 2011 European Cup, IT Security for the Next Generation, p.1 -15, 2011.
  7. M. Firdhous, O. Ghazali, and S. Hassan, Trust and Trust Management in Cloud Computing – A Survey, Inter Networks Research Group, University Utara Malaysia, Technical Report UUM/CAS/InterNetWorks/TR2011-01, 2011.
  8. Farhad Soleimanian Gharehchopogh, Sajjad Hashemi, “Security Challenges in Cloud omputing with More Emphasis on Trust and Privacy”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, Vol. 1, ISSUE 6, pp. 49-54. 2012.
  9. Chandrahasan, R. Kalaichelvi, S. Shanmuga Priya, and L. Arockiam. "Research Challenges and Security Issues in Cloud Computing." International Journal of Computational Intelligence and Information Security 3.3 (2012): 42-48.
  10. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4(2), 39-51, University of Texas, USA, April-June 2010.
  11. Z. Wang, “Security and Privacy Issues within the Cloud Computing,”2011 International Conference on Computational and Information Sciences, (2011), pp. 175–178.
  12. J. C. Roberts II and W. Alhamdani, “Who Can You Trust in the Cloud?: a Review of Security Issues within Cloud Computing”, ACM International Security Curriculum Development Conference, (2011), pp. 15–19.
  13. Dusit Niyato,” Optimization-Based Virtual Machine Manager for Private Cloud Computing”, Third IEEE International Conference on Coud Computing Technology and Science, 2011.
  14. Abdur Rahim Choudhary,” Baseline Requirements and Architecture for Cloud Computing Services”, International Journal of Advanced Computer Research (IJACR) ,Volume-2 Number-4 Issue-7 December-2012.
  15. Danish Jamil, Hassan Zaki, Security Issues In Cloud Computing And Countermeasures, International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-2676, April 2011
  16. ShivShakti etc(2013 January-Febuary).”Encryption using different techniques:A Review” international journal in Multidisciplinary and academic research (SSIJMAR) vol.2 No.1 - (ISSN 2278-5973).
  17. J.Srinivas, K.Venkata Subba Reddy, Dr.A.Moiz Qyser(2012 july )”Cloud Computing Basics” International Journal of Advanced Research in Computer and Communication Engineering ,Vol. 1, Issue.
  18. Emam, A.H.M. (2013). Additional Authentication and Authorization using Registered Email-ID for Cloud Computing. International Journal of Soft Computing and Engineering, 3(2), 110-113.
  19. Han, J., Susilo, W. and Mu, Y. (2013). Identity-based data storage in cloud computing. Future Generation Computer Systems, 29, 673–681. doi:10.1016/j.future.2012.07.010
  20. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W. and Zou, D. (2012). Efficient Password-based Two Factors Authentication in Cloud Computing. International Journal of Security and Its Applications, 6(2), 143-148.
  21. Kumar, A. (2012). World of Cloud Computing & Security. International Journal of Cloud Computing and Services Science, 1(2), 53-58.
  22. Celesti, A., Fazio, M., Villari, M. and Puliafito, A. (2012). Virtual machine provisioning through satellite communications in federated Cloud environments. Future Generation Computer Systems, 28, 85–93. doi:10.1016/j.future.2011.05.021
  23. Casola, V., Cuomo, A., Rak, M. and Villano, U. (2013). The Cloud Grid approach: Security analysis and performance evaluation. Future Generation Computer Systems, 29, 387–401.

Keywords

Component, formatting, style, styling, insert