CFP last date
20 May 2024
Reseach Article

Data Protection for Users in Cloud Computing

by Augustine Obulor Ugbari, Betty Osamegbe Ahubele
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 38
Year of Publication: 2022
Authors: Augustine Obulor Ugbari, Betty Osamegbe Ahubele
10.5120/ijca2022922215

Augustine Obulor Ugbari, Betty Osamegbe Ahubele . Data Protection for Users in Cloud Computing. International Journal of Computer Applications. 184, 38 ( Dec 2022), 1-5. DOI=10.5120/ijca2022922215

@article{ 10.5120/ijca2022922215,
author = { Augustine Obulor Ugbari, Betty Osamegbe Ahubele },
title = { Data Protection for Users in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2022 },
volume = { 184 },
number = { 38 },
month = { Dec },
year = { 2022 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number38/32560-2022922215/ },
doi = { 10.5120/ijca2022922215 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:24:55.080420+05:30
%A Augustine Obulor Ugbari
%A Betty Osamegbe Ahubele
%T Data Protection for Users in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 38
%P 1-5
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information technology might have simplified the way we do business, but it has also brought challenges that never existed. Accessing data from public repositories leads to multiple difficulties. It is also necessary for the data to be available in an accurate, complete, and timely manner. This paper will discuss the challenges and breaches of data protection for users in cloud computing and explore various techniques used to address these issues.

References
  1. Alexa Huth and James Cebula ‘The Basics of Cloud Computing’, United States Computer Emergency Readiness Team. (2011)
  2. Garima Saini, Gurgaon Naveen Sharma,” Triple Security of Data in Cloud Computing “, Garima Saini et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol.5 (4), 2014.
  3. D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA Volume 8, 2009.
  4. Qi. Zhang ·Lu. Cheng, Raouf Boutaba, “Cloud computing: state-Of-the-art and research Challenges”, “The Brazilian Computer Society”, April 2010.
  5. Foster, I. T., Zhao, Y., Raicu, I., & Lu, S. (2009). Cloud Computing and Grid Computing 360- Degree Compared CoRR. abs/0901.0131.
  6. Srinivasa rao v, Nageswara rao n k, E Kusuma kumari, “Cloud Computing: An Overview”, Journal of Theoretical and Applied Information Technology.
  7. Rachna Jain and Ankur Aggarwal ‘Cloud Computing Security Algorithm’, International Journal of Advanced Research in Computer Science and Software Engineering. January (2014) Vol. 4, Issue 1.
  8. Manzoor Hussain Dar, Pardeep Mittal, and Vinod Kumar, ‘A Comparative Study of Cryptographic Algorithms’, International Journal of Computer Science and Network. June (2014) ISSN(Online): 2277- 5420, Volume 3, Issue 3.
  9. Gartener: Seven cloud-computing security risks. InfoWorld.2008-07-02. http://www.infoworld.com/d/security-central/gartener-seven-cloud- computing-security-risks-853.
  10. G. Devi and M. Pramod Kumar, ‘Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish Algorithm’, International Journal of Computer Trends and Technology. (2012) Vol. 3 Issue 4, ISSN: 2231-2803, pp.592-596.
  11. Mr. Gurjeevan Singh, Mr. Ashwani Singla and Mr. K S Sandha “Cryptography Algorithm Comparison for Security Enhancement in Wireless Intrusion Detection System” International Journal of Multidisciplinary Research Vol.1 Issue 4, August 2011.
  12. Sandipan Basu, ‘International Data Encryption Algorithm (IDEA) - A Typical Illustration’, Journal of Global Research in Computer Science. July (2011) ISSN: 2229-371X Vol. 2, Issue 7.
  13. Ayan Mahalanobis, ‘Diffie-Hellman Key Exchange Protocol’, Its Gernalization and Nilpotent Groups. August (2005).
  14. Maha TEBAA, Said EL HAJJI and Abdellatif EL GHAJI, ‘Homomorphic Encryption Applied to the Cloud Computing Security’, World Congress on Engineering. July 4 (2012) Vol. 1, London U.K. ISBN: 978-988-19251-3-8, ISSN: 2078-0958 (Print); ISSN: 2078-0966 (online).
  15. B.Persis Urbana Ivy, Purshotam Mandiwa and Mukesh Kumar, ‘A Modified RSA Cryptosystem Based on ‘n’ Prime Number’, International Journal of Engineering and Computer Science. Nov (2012) ISSN: 2319-7242 Volume 1 Issue 2.
  16. Shakeeba S. Khan and Prof. R.R. Tuteja, ‘Security in Cloud Computin Using Cryptographic Algorithms’, International Journal of Innovative Research in Computer and Communication Engineering. January 1, (2015) ISSN (online): 2320-9801, (Print): 2320-9798 Vol. 3, Issue.
  17. Ohri, A. (2020). Elliptic Curve Cryptography: An Overview. Retrieved 27/01/2022www.jigsawacademy.com
  18. Muyinnda, N (2014. Elliptic Curve Cryptography. Mekere University. Retrieved 28/01/2022. www.researchgate.net
  19. Gahan, A. (2019). An Empirical Study of Security Issues in Encryption Techniques. International Journal of Applied Engineering Research. 14(5). 1049-1061
Index Terms

Computer Science
Information Sciences

Keywords

Data protection encryption techniques cloud computing