CFP last date
20 May 2024
Reseach Article

Data Security over Cloud

Published on April 2012 by D. H. Patil, Rakesh R. Bhavsar, Akshay S. Thorve
Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
Foundation of Computer Science USA
ETCSIT - Number 5
April 2012
Authors: D. H. Patil, Rakesh R. Bhavsar, Akshay S. Thorve
e682e04c-1dcb-40f2-9acf-a1b60a6a330e

D. H. Patil, Rakesh R. Bhavsar, Akshay S. Thorve . Data Security over Cloud. Emerging Trends in Computer Science and Information Technology (ETCSIT2012). ETCSIT, 5 (April 2012), 11-14.

@article{
author = { D. H. Patil, Rakesh R. Bhavsar, Akshay S. Thorve },
title = { Data Security over Cloud },
journal = { Emerging Trends in Computer Science and Information Technology (ETCSIT2012) },
issue_date = { April 2012 },
volume = { ETCSIT },
number = { 5 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 11-14 },
numpages = 4,
url = { /proceedings/etcsit/number5/5993-1035/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%A D. H. Patil
%A Rakesh R. Bhavsar
%A Akshay S. Thorve
%T Data Security over Cloud
%J Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%@ 0975-8887
%V ETCSIT
%N 5
%P 11-14
%D 2012
%I International Journal of Computer Applications
Abstract

Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. Security must be provided to such outsourced data, so that user are not worried while uploading there confidential data. Recent technologies suffer from computational problem of keys and there exchange. This paper addresses the various problems and issues involved in using cloud services such as key generation, data security, authentication. This paper addresses this problem using access control technique that ensures only valid users will access there outsourced data. This paper proposes a Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that solves the problem of key distribution and management. Authentication will be done using Two Factor Authentication Technique with the help of key generated using Diffie-Hellman key exchange algorithm The proposed work is highly efficient and secure under existing security models.

References
  1. Eoin Gleeson, "Computing industry set for a shocking change," Apr 2009, MoneyWeek, from http://www. moneyweek. com/investment-advice/computing-industry-set-for-a-shocking-change-43226. aspx
  2. "The NIST Definition of Cloud Computing". National Institute of Science and Technology. Retrieved 24 July 2011. Mudili Soujanya, Sarun Kumar,Personalized IVR system in Contact Center, Department of Computer Science Engineering International Institute of Information Technology Bhubaneswar, India.
  3. Reza Sherafat Kazemzadeh and KamranSartipi, Incoporating Data Mining Applications into Clinical Guildelines, McMaster University Department of Computing and Software 1280 Main Street West, Hamilton, Ontario, Canda.
  4. S. Kamara, and K. Lauter, "Cryptographic Cloud Storage," in Proc. of Financial Cryptography: Workshop on real life cryptographic protocols and standardization, 2010, from http://research. microsoft. com/pubs/112576/crypto-cloud. pdf
  5. Amazon EC2 and S3, Online at http://aws. amazon. com/
  6. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," in Proc. of IEEE INFOCOM 2010, 2010.
  7. Z. Dai, and Q. Zhou, "A PKI-based Mechanism for Secure and Efficient Access to Outsourced Data," in Proc. of International Conference on Networking and Digital Society, 2010, pp. 640-643.
  8. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," in Proc. of IEEE INFOCOM 2010, 2010.
  9. L. M. Vaquero, L. Rodero-Merino, J. Caceres, M. Lindner, "A Break in the Clouds: Towards a Cloud Definition," in Proc. Of ACM SIGCOMM Computer Communication Review, 39(1), Jan 2009, pp. 50-55.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cryptography Access Control Security