CFP last date
20 May 2024
Reseach Article

An Efficient Methodology for Storing Sensitive Data using Nested Cloud

by Arjun Aggarwal, Abhijeet Mishra, Gaurav Singhal, Sushil Kr. Saroj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 10
Year of Publication: 2016
Authors: Arjun Aggarwal, Abhijeet Mishra, Gaurav Singhal, Sushil Kr. Saroj
10.5120/ijca2016909950

Arjun Aggarwal, Abhijeet Mishra, Gaurav Singhal, Sushil Kr. Saroj . An Efficient Methodology for Storing Sensitive Data using Nested Cloud. International Journal of Computer Applications. 142, 10 ( May 2016), 37-42. DOI=10.5120/ijca2016909950

@article{ 10.5120/ijca2016909950,
author = { Arjun Aggarwal, Abhijeet Mishra, Gaurav Singhal, Sushil Kr. Saroj },
title = { An Efficient Methodology for Storing Sensitive Data using Nested Cloud },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 10 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number10/24935-2016909950/ },
doi = { 10.5120/ijca2016909950 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:39.417057+05:30
%A Arjun Aggarwal
%A Abhijeet Mishra
%A Gaurav Singhal
%A Sushil Kr. Saroj
%T An Efficient Methodology for Storing Sensitive Data using Nested Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 10
%P 37-42
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the period of revolutionary change in information technology, the two developments that are most far-reaching have been cloud computing and the mobile Internet. These two information technology revolutions diverge in mobile cloud computing. There are already immense risks with data hosted in-house, so it’s no secret that data offsite sits at even higher risk. With Data on offsite, higher avenues for attack and the fact that it will be traveling more makes it easier to be hijacked. With the technology regularly improving, there are ways to make sure of greater security. However with technology regularly improving, there are always people out there lifting their hacking skills. An effective methodology with prominent features of data integrity and confidentiality is proposed here to ensure the safety of offsite data or the data on cloud. In this paper we propose the mechanism which uses the concepts of ECC algorithm, Shamir’s secret key sharing algorithm along with distinct cryptography tools such as threshold cryptography that enhances the security of data stored on clouds.

References
  1. Shamim Hossain, “What is mobile cloud computing?". [Online].Available:http://wedowebsphere.de/blogpost/what-mobile-cloud-computing.
  2. M. Padma, and M. Lakshmi Neelima, “Mobile Cloud Computing: Issues from a Security Perspective," International Journal of Computer Science and Mobile Computing (IJCSMC), v.3, i.5, p.972-977, May. 2014.
  3. Preeti Garg, and Dr. Vineet Sharma, “An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash functions," International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 IEEE, vol., no., pp.334-339, 7-8 February 2014.
  4. Don Boneh, and RamarathnamVenkatesan, “Breaking RSA May Be Easier Than Factoring,"Lecture Notes in Computer Science, 1998EurocryptSpringer-Verlag,vol. 1233, no., pp.59-71, March 1998.
  5. Doyel Pal, Praveen kumar Khethavath, Johnson P. Thomas, and Tingting Chen, “Multilevel Threshold Secret Sharing in Distributed Cloud,"Third International Symposium on Security in Computing and Communications (SSCC), 2015Springer,vol. 536, no., pp.13-23, 10-13August 2015.
  6. Bithin, “Simple explanation for Elliptic Curve Cryptographic algorithm (ECC)". [Online].Available: https://bithin.wordpress.com/2012/02/22/simpleexplanation-for-elliptic-curve-cryptography-ecc
  7. Balasaraswathi V.R., and Manikandan.S, “Enhanced Security for Multi-Cloud Storage using Cryptographic Data Splitting with Dynamic Approach," International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014 IEEE, vol., no., pp.1190-1194, 8-10May 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud mobile cloud computing offsite data security threshold cryptography.