CFP last date
22 April 2024
Reseach Article

The Comprehensive Approach for Data Security in Cloud Computing: A Survey

by Nilesh N. Kumbhar, Virendrasingh V. Chaudhari, Mohit A.Badhe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 18
Year of Publication: 2012
Authors: Nilesh N. Kumbhar, Virendrasingh V. Chaudhari, Mohit A.Badhe
10.5120/5080-7433

Nilesh N. Kumbhar, Virendrasingh V. Chaudhari, Mohit A.Badhe . The Comprehensive Approach for Data Security in Cloud Computing: A Survey. International Journal of Computer Applications. 39, 18 ( February 2012), 23-29. DOI=10.5120/5080-7433

@article{ 10.5120/5080-7433,
author = { Nilesh N. Kumbhar, Virendrasingh V. Chaudhari, Mohit A.Badhe },
title = { The Comprehensive Approach for Data Security in Cloud Computing: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 18 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number18/5080-7433/ },
doi = { 10.5120/5080-7433 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:52.162616+05:30
%A Nilesh N. Kumbhar
%A Virendrasingh V. Chaudhari
%A Mohit A.Badhe
%T The Comprehensive Approach for Data Security in Cloud Computing: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 18
%P 23-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is becoming next stage platform in the evolution of the internet. It provides the customer an enhanced and efficient way to store data in the cloud with different range of capabilities and applications. The data in the cloud is stored by the service provider. Service provider capable and having a technique to protect their client data to ensure security and to prevent the data from discloser by unauthorized users. This paper, will gives a descriptive knowledge regarding cloud computing privacy and security issue provided by encryption and decryption services. If a cloud system is performing a task of storage of data and encryption and decryption of data on the same cloud then there are much more chances of getting access to the confidential data without authorization. This increases the risk factor in terms of security and privacy. This paper helps us on proposes a business model for cloud computing which focused on separating the encryption and decryption service, from the storage service provided by service provider. I means that both encryption and decryption of the data can performed at two distinct places. For studying this proposal are using a business model named as CRM (customer relationship model) for an example. For the evaluation of effective an efficient technique of data storage and retrieval we are providing three clouds separately such as including encryption and decryption services, secondly storage and a CRM application system. In this Research paper, we have tried to access separate encryption and decryption service using RSA algorithm and computing is a paradigm in which information is stored in servers on the internet. That information retrieved by the client as per usage. For this manner, we provide us a solution for data security, confidentiality and privacy based on a concept of separate encryption and decryption service.

References
  1. Cloud Computing FOR DUMMIES by Judith Hurwitz, RobinBloor, Marcia Kaufman, and Fern Halper. WILEY INDIA EDITION.
  2. Peter Mell, and Tim Grance, “Draft NIST Working Definition of Cloud Computing,” 2009, from http://csrc.nist.gov/groups/SNS/cloud-computing
  3. Sales force Customer Relationships Management (CRM) system, http://www.salesforce.com/
  4. Amazon EC2 and S3, Online at http://aws.amazon.com/
  5. Google App Engine, Online at http://code.google.com/appengine/
  6. B. R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,”in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520, September 2009.
  7. N. Hawthorn, “Finding security in the cloud,” Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
  8. Salesforce.com, Inc., “Force.com platform,” Retrieved Dec. 2009, from http://www.salesforce.com/tw
  9. SAP AG., “SAP services: maximize your success,” Retrieved Jan. 2010, From http://www.sap.com/services/index.epx
  10. A. Parakh and S. Kak, “Online data storage using implicit security”, Information Sciences, vol. 179, issue 19, pp. 3323-3333 ,September 2009
  11. Delivering and implementing a secure infrastructure. Pete boden and mark estberg online services security and compliance Microsoft Corporation.
  12. Nasuni, data storage: www.nasuni.com
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing encryption and decryption cloud service service level agreement availability reliability integrity data privacy protection