CFP last date
20 March 2024
Reseach Article

Data Security Framework for Offsite Storage of Data

by Neha Upadhyay, Ajay Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 15
Year of Publication: 2014
Authors: Neha Upadhyay, Ajay Kumar

Neha Upadhyay, Ajay Kumar . Data Security Framework for Offsite Storage of Data. International Journal of Computer Applications. 90, 15 ( March 2014), 31-35. DOI=10.5120/15798-4552

@article{ 10.5120/15798-4552,
author = { Neha Upadhyay, Ajay Kumar },
title = { Data Security Framework for Offsite Storage of Data },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 15 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { },
doi = { 10.5120/15798-4552 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:11:08.572517+05:30
%A Neha Upadhyay
%A Ajay Kumar
%T Data Security Framework for Offsite Storage of Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 15
%P 31-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

The new era of computing has arrived i. e. Cloud Computing. The arrival of cloud computing is beginning of transformation in IT Industry because of its low cost, high accessibility, high performance and also other characteristics. In this technology user can access services reside in the remote servers maintained by third party. The data reside in cloud is of great value and its loss or damage could be a total disaster for its owner. So it is very much required to have secure method to preserve important data in order to prevent data loss. This paper examines the various data storage security issues and provides a better solution. Paper proposed a framework deal with different techniques to provide secure data storage in cloud. The strategy projected different segments which describe an authentication and authorization protocol using two way authentication, password hashing and encryption of data. It is possible to satisfy integrity, consistency and availability using this framework.

  1. Using encryption Algorithms to enhance the Data Security in Cloud Computing, Mandeep kaur and Manish Mahajan. ". International Journal of Communication and Computer Technologies (2278-9723)Volume 01 – No. 12, Issue: 03 January 2013.
  2. An analysis of security issues for cloud computing, Keiko Hashizume, David G Rosado, Eduardo Fernandez Medina. Journal of Internet Services and Applications2013, 4:5.
  3. A combined approach to ensure data security in cloud computing, Sandeep K. Sood. Journal of Network and Computer Applications 35 (2012) 1831–1838.
  4. Privacy-Preserving Public Auditing forSecure Cloud Storage, Cong Wang, Student Member, IEEE, Sherman S. M. Chow, Qian Wang, Student Member, IEEE.
  5. Model of solution for data security in cloud computing, Zuzana Priš?áková and Ivana Rábová. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT).
  6. SHA-512/256, Shay Gueron, Simon Johnson, Jesse Walker. Department of Mathematics, University of Haifa, Israel, Mobility Group, Intel Corporation, Israel Development Center, Haifa, Israel, Intel Architecture Group, Intel Corporation, Security Research Lab, Intel Labs, Intel Corporation, USA.
  7. Securing the Private Cloud: Exploring the value of tokenization.
  8. Survey on Data Security Issues and Data Security Models in Cloud Computing, Ramasami S. , Umamaheswari P. International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 3, March 2012.
  9. A Strong User Authentication Framework for Cloud Computing, Choudhury A. J. , Kumar P. , Sain M. ,Hyotaek L. and Hoon , ServicesComputing Conference (APSCC), 2011 IEEE Asia-Pacific, 2011.
  10. Data Security Policy In The Cloud Computing, RAN Shuanglin. The 7th International Conference on Computer Science & Education (ICCSE 2012).
Index Terms

Computer Science
Information Sciences


Authentication data encryption data privacy data security.