![]() |
10.5120/ijca2017913119 |
Subasish Mohapatra, Subhadarshini Mohanty, Arunima Hota and Shradha Pattanayak. Data Security Enhancement in Cloud Computing using Proxy Blind Signature. International Journal of Computer Applications 161(2):27-31, March 2017. BibTeX
@article{10.5120/ijca2017913119, author = {Subasish Mohapatra and Subhadarshini Mohanty and Arunima Hota and Shradha Pattanayak}, title = {Data Security Enhancement in Cloud Computing using Proxy Blind Signature}, journal = {International Journal of Computer Applications}, issue_date = {March 2017}, volume = {161}, number = {2}, month = {Mar}, year = {2017}, issn = {0975-8887}, pages = {27-31}, numpages = {5}, url = {http://www.ijcaonline.org/archives/volume161/number2/27121-2017913119}, doi = {10.5120/ijca2017913119}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
Cloud computing is a rapidly growing internet based computing that endeavors to be dynamic, reliable and available with guaranteed quality of service. This has become a sophisticated computing platform or technology for customers as well as organizations for its availability of resources such as software, storage and network with minimum cost. Using the business model like Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS) this environment have increased distribute computing capacity. Preserving confidentiality, integrity and availability are the vexing issues in cloud computing environment. This paper highlights cloud computing threats and proposes a distributed and efficient encryption algorithm to enhance the data security in cloud.
References
- Manvi, Sunilkumar S., and Gopal Krishna Shyam. "Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey." Journal of Network and Computer Applications 41 (2014): 424-440.
- Mell, Peter, and Tim Grance. "The NIST definition of cloud computing." (2011).
- Nandgaonkar, Suruchee V., and A. B. Raut. "A comprehensive study on cloud computing." International Journal of Computer Science and Mobile Computing 3.4 (2014): 733-738.
- Stieninger, Mark, and Dietmar Nedbal. "Characteristics of cloud computing in the business context: A systematic literature review." Global Journal of Flexible Systems Management 15.1 (2014): 59-68.
- Yau, Stephen S., and Ho G. An. "Software engineering meets services and cloud computing." Computer 44.10 (2011): 47-53.
- Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.
- Ajoudanian, Sh, and M. R. Ahmadi. "A novel data security model for cloud computing." International Journal of Engineering and Technology 4.3 (2012): 326.
- Ahmed, Monjur, and Mohammad Ashraf Hossain. "Cloud computing and security issues in the cloud." International Journal of Network Security & Its Applications 6.1 (2014): 25.
- Liu, Bingwei, et al. "Information fusion in a cloud computing era: a systems-level perspective." IEEE Aerospace and Electronic Systems Magazine 29.10 (2014): 16-24.
- Priyadharshini, V., and A. Malathi. "Survey on software testing techniques in cloud computing." CoRR, abs/1402.1925 (2014).
- Wei, Lifei, et al. "Security and privacy for storage and computation in cloud computing." Information Sciences 258 (2014): 371-386.
- J. Katz, A. Sahai, and B. Waters, “Predicate Encryption, Supporting Disjunctions, Polynomial Equations, and InnerProducts,” LNCS vol. 4965/2008, pp. 146-162, ©Springer Berlin Heidelberg, 2008.
- Sahu, Rajeev Anand, and Sahadeo Padhye. "Provable secure identity based multi‐proxy signature scheme." International Journal of Communication Systems 28.3 (2015):497-512.
Keywords
Cloud Computing, Security threats, Proxy blind signature.