CFP last date
20 May 2024
Reseach Article

Improvising Information Security in Cloud Computing Environment

by Shweta Sharma, Bharat Bhushan, Shalini Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 16
Year of Publication: 2014
Authors: Shweta Sharma, Bharat Bhushan, Shalini Sharma
10.5120/15071-3503

Shweta Sharma, Bharat Bhushan, Shalini Sharma . Improvising Information Security in Cloud Computing Environment. International Journal of Computer Applications. 86, 16 ( January 2014), 22-25. DOI=10.5120/15071-3503

@article{ 10.5120/15071-3503,
author = { Shweta Sharma, Bharat Bhushan, Shalini Sharma },
title = { Improvising Information Security in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 16 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 22-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number16/15071-3503/ },
doi = { 10.5120/15071-3503 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:23.656362+05:30
%A Shweta Sharma
%A Bharat Bhushan
%A Shalini Sharma
%T Improvising Information Security in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 16
%P 22-25
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The evolution of internet has introduced an immense change in the usage of information and communication technologies. The fast, easy-to-use and pay per usage criteria leads to cloud computing infrastructure. Cloud Computing provides network services to its clients as per their requirements. Nowadays, information security has become a serious issue while client-server interaction in cloud computing environment. The privacy and integrity of information to be exchanged or stored needs to be protected to ensure a safe cloud computing platform establishment. In this paper, a security framework has been proposed to alleviate the security level of information transferred from client end to cloud service provider (server). Certain authentication and file integrity techniques have been studied and are suggested to be implemented under the proposed scheme. This way, scheme ensures good quality of confidentiality, Integrity and Authentication during storage and access of information in cloud computing. Certain cryptographic (symmetric and asymmetric) techniques have been used to design the proposed framework.

References
  1. G A Solanki, "Welcome To The Future of Computing: Cloud Computing And Legal Issues ",International journal of scientific and technology , vol. 1, no. 4, pp. , Oct 2012.
  2. Lijun Mei, W. K. Chan, T. H. Tse, "A Tale of Clouds: Paradigm comparisons and some thoughts on research issues", 2008 IEEE Asia-Pacific Services Computing Conference.
  3. Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono, "On technical security issues in cloud computing" 2009, IEEE Computer Society.
  4. Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit, "Cloud security Issues"2009, IEEE.
  5. Guy Bunker, Farnam Jahanian, Aad van Moorsel, Joseph Weinman,"Dependability in the cloud: Challenges and opportunities", IEEE 2009.
  6. Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza Carvalho, Mats Naslund, Makan Pourzandi, "A quantitative analysis of current security concerns and solutions for cloud computing", Gonzalez et al. Journal of Cloud Computing: Advances, Systems and Applications2012,http://www. journalofcloudcomputing. com/content/1/1/11.
  7. John Harauz, Lori M. Kaufman, Bruce Potter, "Data security in the world of cloud computing",2009 IEEE CO Published by the IEEE Computer and Reliability Societies.
  8. Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, "Identity-Based Authentication for Cloud Computing", Springer-Verlag Berlin Heidelberg 2009.
  9. Sanchika Gupta, Anjali Sardana, Padam Kumar, "A light Weight Centralized File Monitoring Approach for Securing Files in Cloud Environment ", The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) ©IEEE 2012.
  10. M. Sudha, M. Monika, "Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography", Advances in Computer Science and its Applications 32 Vol. 1, No. 1, March 2012, Copyright © World Science Publisher, United States. www. worldsciencepublisher. org
  11. A secure and light weight approach for critical data security in cloud : 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).
  12. Siani Pearson" Taking account of Privacy when Designing Cloud computing Services CLOUD'09, May 23, 2009, Vancouver, Canada ,2009 IEEE.
  13. Cong Wang, Qian Wang and Kui Ren,"Ensuring Data Storage Security in Cloud computing"978-1- 4244 -3876-1/2009 IEEE
  14. Forouzan, "Cryptography and Network Security", TMH 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Information security integrity authentication cryptography framework