Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Survival Analysis on Secured Data Communication in Cloud

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2022
S.L. Swapna, V. Saravanan

S L Swapna and V Saravanan. Survival Analysis on Secured Data Communication in Cloud. International Journal of Computer Applications 183(46):31-35, January 2022. BibTeX

	author = {S.L. Swapna and V. Saravanan},
	title = {Survival Analysis on Secured Data Communication in Cloud},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2022},
	volume = {183},
	number = {46},
	month = {Jan},
	year = {2022},
	issn = {0975-8887},
	pages = {31-35},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2022921864},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Cloud computing is here to stay within Internet technology that presents user everything in terms of services like computing power to computing infrastructure, applications, business processes over the web. With fast growth of big data analytics, network security is an essential research field. Secure transmission is defined as the data transfer like confidential information through the secure channel. Secure communication is the process of communicating with two entities and not want third party to listen. The people share their information with diverse degrees of certainty. The data security is an essential role for guaranteeing the drastic development of number of cloud users. Many secured data storage mechanisms are designed by many researchers in past. But, the available mechanisms are time consuming process and not attained the necessary security. It failed to provide adequate security analytics performance with higher accuracy and minimal time consumption. In order to address these problems, existing secured data communication in cloud is reviewed.


  1. Medhavi, S. Shriwas., Neetesh, Gupta., and Amit, Sinhal. 2012. Comparative Study of Cloud Computing and Mobile Cloud Computing. In IJCA Proceedings on National Conference. 13-19.
  2. Hatem, Hamad., and Mahmoud, Al-hoby. 2012. Managing Intrusion Detection as a Service in Cloud Networks. International Journal of Computer Applications. 41(1), 35-40.
  3. Swapna, S. L., and Saravanan, V. 2021. Big Data Challenges and Learning Paradigms: A Review. Journal of University of Shanghai for Science & Technology. 23(12),36-45.
  4. Khalid, Haseeb., Soojeong, Lee., and Gwanggil, Jeon. 2020. EBDS: An energy-efficient big data-based secure framework using Internet of Things for green environment. Environmental Technology & Innovation. Elsevier. 20, 1-19.
  5. Jianhua, Peng., Hui, Zhou., Qingjie, Meng., and Jingli, Yang. 2020. Big data security access control algorithm based on memory index acceleration in WSNs. EURASIP Journal on Wireless Communications and Networking. Springer. 90, 1-17.
  6. Uma, Narayanan., Varghese, Paul., and Shelbi, Joseph. 2020. A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University - Computer and Information Sciences. 1-15.
  7. Youke, Wu., Haiyang, Huang,, Ningyun, Wu., Yue, Wang,, Md, Zakirul, Alam, Bhuiyan., and Tian, Wang. 2020. An incentive-based protection and recovery strategy for secure big data in social networks. Information Sciences. Elsevier. 508, 79-91.
  8. Imane, El, Alaoui., and Youssef, Gahi. 2020. Network Security Strategies in Big Data Context. Procedia Computer Science. Elsevier. 175, 730-736.
  9. Priyank, Jain., Manasi, Gyanchandani., and Nilay, Khare. 2019. Enhanced Secured Map Reduce layer for Big Data privacy and security. Journal of Big Data. 6 (30), 1-15.
  10. Jianhua, Peng., Hui, Zhou., Qingjie, Meng., and Jingli, Yang. Big data security access control algorithm based on memory index acceleration in WSNs. EURASIP Journal on Wireless Communications and Networking. Springer. 90, 1-17.
  11. Saleh, Atiewi., Amer, Al-Rahayfeh., Muder, Almiani., Salman, Yussof., Omar, Alfandi., Ahed, Abugabah., and Yaser, Jararweh. 2020. Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography. IEEE Access. 8, 113498-113511.
  12. Mohammed, Aledhari., Marianne, Di, Pierro., Mohamed, Hefeida., and Fahad, Saeed. 2021. A Deep Learning-Based Data Minimization Algorithm for Fast and Secure Transfer of Big Genomic Datasets. IEEE Transactions on Big Data. 7(2), 271 – 284.
  13. Ruidong, Li., Hitoshi, Asaeda., and Jie, Wu. 2020. DCAuth: Data-Centric Authentication for Secure In-Network Big-Data Retrieval. IEEE Transactions on Network Science and Engineering. 7(1), 15 – 27.
  14. Dharminder, Dharminder., Mohammad, S. Obaidat., Dheerendra, Mishra., and Ashok, Kumar, Das. 2021. SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment. IEEE Systems Journal. 15(1), 598-606.
  15. Srinivas, Jangirala., Ashok, Kumar, Das., Mohammad, Wazid., and Athanasios, V. Vasilakos. 2021. Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System. IEEE Internet of Things Journal. 8(9), 7727 – 7744.
  16. .


Cloud Computing, Big Data Analytics, Network Security, Data Storage