Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

An Approach for Ensuring Security in Cloud Environment

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 10
Year of Publication: 2014
Sumita Lamba
Ajay Kumar

Sumita Lamba and Ajay Kumar. Article: An Approach for Ensuring Security in Cloud Environment. International Journal of Computer Applications 90(10):37-41, March 2014. Full text available. BibTeX

	author = {Sumita Lamba and Ajay Kumar},
	title = {Article: An Approach for Ensuring Security in Cloud Environment},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {10},
	pages = {37-41},
	month = {March},
	note = {Full text available}


Many people consider "CLOUD" as the buzzword for internet and utility computing, but this innovative paradigm of computing is imparting new designs of computing platforms. Being a pool of ample of resources, cloud computing allows the access to the users through internet. It has greatly emerged as a computing standard where the computing infrastructure is served as internet services and has made an effective change in the way of computation and services for its customers. There is a need of such a cloud which doesn't compromise with any of the following: Integrity, reliability, flexibility and elasticity, and ensure security for storing and transmitting the data. In cloud, the user's data is stored tenuously and they have no control over it, so security issues have always been dilemma here. In this paper, we have proposed a new practical approach to secure the cloud environment for data storage by blending authentication with hashing and encryption algorithm. We aim to develop a secure cloud environment which ensures the standards of user and data authentication, data confidentiality and user oriented access control.


  • Rohit Bhadauria. "Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques" International Journal of Computer Applications (0975 – 888) Volume 47– No. 18, June 2012.
  • Edward S David. Promises and Challenges of Cloud Computing. International Journal of Computer Applications (0975 – 8887) International Conference on Current Trends in Advanced Computing "ICCTAC-2013".
  • Anup Mathew. "Survey Paper on Security & Privacy Issues in Cloud Storage Systems", EECE 571B, Term survey paper, April 2012.
  • S. Sabarish, G. Basha & A. Padmashree, Tirupur M. King, B. Zhu, and S. Tang. "Secured cloud environment with a new approach", "Optimal path planning," Mobile Robots, vol. 8, no. 2, pp. 520-531, March 2001.
  • Priyanka V. Mogre, Girish Agarwal, Pragati Patil . "Data Security and its techniques in Cloud Storage – A Review" International Journal of Engineering Research and Technology Vol. 1 (02), 2012, ISSN 2278 – 0181.
  • Sanjoli Singla, Jasmeet Singh. Cloud Data Security using Authentication and Encryption Technique International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323 Volume 2, Issue 7, July 2013.
  • Mr. Prashant Rewagad, Ms. Yogita Pawar. "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing" International Conference on Communication Systems and Network Technologies,2013.
  • Pradeep Bhosale, Priyanka Deshmukh, Girish Dimbar and Ashwini Deshpande. Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption, International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 8, October – 2012.
  • Ankit Kumar Sahu. "Java Web Deployment in Cloud Computing", International Journal of Computer Applications (0975 – 8887) Volume 75– No. 15, August 2013.