CFP last date
20 May 2024
Reseach Article

A Review Paper for Storage and Computation on Enterprise Data in the Cloud

Published on June 2015 by Khushboo R. Shrote, Pushpanjali Chouragade
National Conference on Recent Trends in Computer Science and Engineering
Foundation of Computer Science USA
MEDHA2015 - Number 1
June 2015
Authors: Khushboo R. Shrote, Pushpanjali Chouragade
09d06fc7-7d60-4f05-8ceb-fd5bdb0a5d7d

Khushboo R. Shrote, Pushpanjali Chouragade . A Review Paper for Storage and Computation on Enterprise Data in the Cloud. National Conference on Recent Trends in Computer Science and Engineering. MEDHA2015, 1 (June 2015), 6-7.

@article{
author = { Khushboo R. Shrote, Pushpanjali Chouragade },
title = { A Review Paper for Storage and Computation on Enterprise Data in the Cloud },
journal = { National Conference on Recent Trends in Computer Science and Engineering },
issue_date = { June 2015 },
volume = { MEDHA2015 },
number = { 1 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 6-7 },
numpages = 2,
url = { /proceedings/medha2015/number1/21423-8004/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computer Science and Engineering
%A Khushboo R. Shrote
%A Pushpanjali Chouragade
%T A Review Paper for Storage and Computation on Enterprise Data in the Cloud
%J National Conference on Recent Trends in Computer Science and Engineering
%@ 0975-8887
%V MEDHA2015
%N 1
%P 6-7
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing provides way to share information. This Information is secured at cloud ends only. Any third party intruder may hack confidential information. While outsourcing its business-critical data and computations to the cloud, an enterprise loses control over them. How should the organization decide what security measures to apply to protect its data and computations that have different security requirements from a Cloud Service Provider (CSP) with an unknown level of corruption? The answer relies on the organization's perception about the CSP's trustworthiness and the security requirements of its data. This paper proposes a decentralized, dynamic and evolving policy-based security framework that helps an organization to derive such perceptions from knowledgeable and trusted employee roles and based on that, choose the most relevant security policy specifying the security measures necessary for outsourcing data and computations to the cloud.

References
  1. S. De, S. Saha, and A. K. Pal, "Achieving Energy Efficiency and Security in Mobile Cloud Computing", Proceedings of the 3rd International Conference on Cloud Computing and Services Sciences CLOSER 2013, SciTePress, 8-10 May 2013, Aachen
  2. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, „Twin Clouds: An Architecture for Secure Cloud Computing", Workshop on Cryptography and Security in Clouds, 2011.
  3. Y. Chen, and R. Sion, "On Securing Untrusted Clouds with Cryptography", Proceedings of the 9th annual ACM Workshop on Privacy in Electronic Society WPES'10, ACM, New York USA, 2010, pp. 109-114.
  4. A. K. Pal and S. Bose, "Information Retrieval as a Service for Multiple Heterogeneous Data–Privacy Model", The Third International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering (PARENG 2013), Pecs, Hungary, 25-27 March 2013.
  5. S. Pearson and A. Benameur, "Privacy, Security and Trust Issues Arising from Cloud Computing", 2nd IEEE Cloud Computing Technology and Science CloudCom, IEEE, 2010, pp. 693-702.
  6. F. Rocha, and M. Correia, "Lucy in the Sky with Diamonds: Stealing Confidential Data in the Cloud", 2011 IEEE/ IFIP 41st International Conference on Dependable Systems and Networks Workshops, 2011, pp. 129-134.
  7. R. Sandhu, and P. Samarati, "Access Control: Principle and Practice", IEEE Communications Magazine Vol. 32 Issue 9, IEEE, 1994, pp. 40-48.
  8. R. Seiger, S. Gro?, and A. Schill, "SecCSIE: A Secure Cloud Storage Integrator for Enterprises", IEEE Conference on Commerce and Enterprise Computing, IEEE, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Service Provider Csp Credentials Encryption Decryption