CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Secure Cloud Model using Classification and Cryptography

by Tamanna, Rajeev Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 159 - Number 6
Year of Publication: 2017
Authors: Tamanna, Rajeev Kumar
10.5120/ijca2017912953

Tamanna, Rajeev Kumar . Secure Cloud Model using Classification and Cryptography. International Journal of Computer Applications. 159, 6 ( Feb 2017), 8-13. DOI=10.5120/ijca2017912953

@article{ 10.5120/ijca2017912953,
author = { Tamanna, Rajeev Kumar },
title = { Secure Cloud Model using Classification and Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 159 },
number = { 6 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume159/number6/27004-2017912953/ },
doi = { 10.5120/ijca2017912953 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:05:02.045702+05:30
%A Tamanna
%A Rajeev Kumar
%T Secure Cloud Model using Classification and Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 159
%N 6
%P 8-13
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing offers numerous benefits including scalability, availability and many services. But with its wide acceptance all over the globe, new risks and vulnerabilities have appeared too. Cloud computing supplies facility of storing and accessing understanding and programs over the web without bothering the storage space on procedure. Storing the data on cloud eliminates one’s worries about space considerations, buying new storage equipment or managing their data, rather they are able to access their data any time from any place provided they have internet access. However, the rising security issues have resisted the companies from connecting with cloud computing fully. Hence security risks have appeared as the main disadvantage of cloud computing. This paper involves the efforts to research the security risk and then proposes a framework to address these risks on the authentication and storage level in cloud computing. While addressing the security issues the first and the foremost thing is to classify what data needs security and what data needn't bother with security and hence data gets classified into classes. To achieve data classification, a data classification approach based on the confidentiality of data is proposed in this paper. Following that an efficient security mechanism must be deployed by means of encryption, authentication, and authorization or by means of every other method to ensure the privacy of s data on cloud storage

References
  1. Munwar ali zardari, Low Tang Jung, Nordin Zakaria,” K-NN Classifier for Data Confidentiality in Cloud Computing”, IEEE, pp.1-6, 2014.
  2. Almorsy, M., Grundy, J., & Ibrahim, A. S., “Collaboration- Based Cloud Computing Security Management Framework” IEEE conference of cloud computing, Washington (DC), pp. 364-371,2011.
  3. Song, D., E. Shi, I. Fischer and U. Shankar, “Cloud data protection for the masses”, IEEE Computer. Soc., Vol. 45, Issue 1, pp.39-45, 2012
  4. Somani U, Lakhani K, Mundra M. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. InParallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on 2010 Oct 28 (pp. 211-216). IEEE.
  5. Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. InSoftware Engineering (CONSEG), 2012 CSI Sixth International Conference on 2012 Sep 5 (pp. 1-8). IEEE.
  6. Yellamma P, Narasimham C, Sreenivas V. Data security in cloud using RSA. InComputing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on 2013 Jul 4 (pp. 1-6). IEEE.
  7. Rewagad P, Pawar Y. Use of digital signature with Diffie Hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on 2013 Apr 6 (pp. 437-439). IEEE.
  8. Sinha N, Khreisat L. Cloud computing security, data, and performance issues. In2014 23rd Wireless and Optical Communication Conference (WOCC) 2014 May 9 (pp. 1-6). IEEE.
  9. Diwan V, Malhotra S, Jain R. Cloud security solutions: Comparison among various cryptographic algorithms. IJARCSSE, April. 2014 Apr.
  10. Zardari MA, Jung LT, Zakaria N. K-NN classifier for data confidentiality in cloud computing. InComputer and Information Sciences (ICCOINS), 2014 International Conference on 2014 Jun 3 (pp. 1-6). IEEE.
  11. Shaikh, Rizwana, and M. Sasikumar. "Data Classification for achieving Security in cloud computing." Procedia Computer Science 45 (Elsevier-2015): 493-498.
  12. Lo’aiTawalbeh NS, Raad S. Al-Qassas and Fahd AlDosari,“A Secure Cloud Computing Model based on Data Classification”. InFirst International Workshop On Mobile Cloud Computing Systems, Management and Security (MCSMS-2015) 2015 (Vol. 52, pp. 1153-1158).
Index Terms

Computer Science
Information Sciences

Keywords

Confidentiality Privacy Preserving Machine learning data classification KNN and Naïve Bayes