CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Survival Analysis on Secured Data Communication in Cloud

by S.L. Swapna, V. Saravanan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 46
Year of Publication: 2022
Authors: S.L. Swapna, V. Saravanan
10.5120/ijca2022921864

S.L. Swapna, V. Saravanan . Survival Analysis on Secured Data Communication in Cloud. International Journal of Computer Applications. 183, 46 ( Jan 2022), 31-35. DOI=10.5120/ijca2022921864

@article{ 10.5120/ijca2022921864,
author = { S.L. Swapna, V. Saravanan },
title = { Survival Analysis on Secured Data Communication in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2022 },
volume = { 183 },
number = { 46 },
month = { Jan },
year = { 2022 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number46/32240-2022921864/ },
doi = { 10.5120/ijca2022921864 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:08.685138+05:30
%A S.L. Swapna
%A V. Saravanan
%T Survival Analysis on Secured Data Communication in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 46
%P 31-35
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is here to stay within Internet technology that presents user everything in terms of services like computing power to computing infrastructure, applications, business processes over the web. With fast growth of big data analytics, network security is an essential research field. Secure transmission is defined as the data transfer like confidential information through the secure channel. Secure communication is the process of communicating with two entities and not want third party to listen. The people share their information with diverse degrees of certainty. The data security is an essential role for guaranteeing the drastic development of number of cloud users. Many secured data storage mechanisms are designed by many researchers in past. But, the available mechanisms are time consuming process and not attained the necessary security. It failed to provide adequate security analytics performance with higher accuracy and minimal time consumption. In order to address these problems, existing secured data communication in cloud is reviewed.

References
  1. Medhavi, S. Shriwas., Neetesh, Gupta., and Amit, Sinhal. 2012. Comparative Study of Cloud Computing and Mobile Cloud Computing. In IJCA Proceedings on National Conference. 13-19.
  2. Hatem, Hamad., and Mahmoud, Al-hoby. 2012. Managing Intrusion Detection as a Service in Cloud Networks. International Journal of Computer Applications. 41(1), 35-40.
  3. Swapna, S. L., and Saravanan, V. 2021. Big Data Challenges and Learning Paradigms: A Review. Journal of University of Shanghai for Science & Technology. 23(12),36-45.
  4. Khalid, Haseeb., Soojeong, Lee., and Gwanggil, Jeon. 2020. EBDS: An energy-efficient big data-based secure framework using Internet of Things for green environment. Environmental Technology & Innovation. Elsevier. 20, 1-19.
  5. Jianhua, Peng., Hui, Zhou., Qingjie, Meng., and Jingli, Yang. 2020. Big data security access control algorithm based on memory index acceleration in WSNs. EURASIP Journal on Wireless Communications and Networking. Springer. 90, 1-17.
  6. Uma, Narayanan., Varghese, Paul., and Shelbi, Joseph. 2020. A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. Journal of King Saud University - Computer and Information Sciences. 1-15.
  7. Youke, Wu., Haiyang, Huang,, Ningyun, Wu., Yue, Wang,, Md, Zakirul, Alam, Bhuiyan., and Tian, Wang. 2020. An incentive-based protection and recovery strategy for secure big data in social networks. Information Sciences. Elsevier. 508, 79-91.
  8. Imane, El, Alaoui., and Youssef, Gahi. 2020. Network Security Strategies in Big Data Context. Procedia Computer Science. Elsevier. 175, 730-736.
  9. Priyank, Jain., Manasi, Gyanchandani., and Nilay, Khare. 2019. Enhanced Secured Map Reduce layer for Big Data privacy and security. Journal of Big Data. 6 (30), 1-15.
  10. Jianhua, Peng., Hui, Zhou., Qingjie, Meng., and Jingli, Yang. Big data security access control algorithm based on memory index acceleration in WSNs. EURASIP Journal on Wireless Communications and Networking. Springer. 90, 1-17.
  11. Saleh, Atiewi., Amer, Al-Rahayfeh., Muder, Almiani., Salman, Yussof., Omar, Alfandi., Ahed, Abugabah., and Yaser, Jararweh. 2020. Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography. IEEE Access. 8, 113498-113511.
  12. Mohammed, Aledhari., Marianne, Di, Pierro., Mohamed, Hefeida., and Fahad, Saeed. 2021. A Deep Learning-Based Data Minimization Algorithm for Fast and Secure Transfer of Big Genomic Datasets. IEEE Transactions on Big Data. 7(2), 271 – 284.
  13. Ruidong, Li., Hitoshi, Asaeda., and Jie, Wu. 2020. DCAuth: Data-Centric Authentication for Secure In-Network Big-Data Retrieval. IEEE Transactions on Network Science and Engineering. 7(1), 15 – 27.
  14. Dharminder, Dharminder., Mohammad, S. Obaidat., Dheerendra, Mishra., and Ashok, Kumar, Das. 2021. SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment. IEEE Systems Journal. 15(1), 598-606.
  15. Srinivas, Jangirala., Ashok, Kumar, Das., Mohammad, Wazid., and Athanasios, V. Vasilakos. 2021. Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System. IEEE Internet of Things Journal. 8(9), 7727 – 7744.
  16. .
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Big Data Analytics Network Security Data Storage