Corpus ID: 6865247

Enhanced Security Architecture for Cloud Data Security

@inproceedings{Kant2013EnhancedSA,
  title={Enhanced Security Architecture for Cloud Data Security},
  author={C. Kant and Y. Sharma},
  year={2013}
}
  • C. Kant, Y. Sharma
  • Published 2013
  • Computer Science
  • Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability decide whether security and privacy of data stored on cloud environment is maintained or not. The… CONTINUE READING
    33 Citations
    Multilevel Security Approach for Cloud Data Storage
    • PDF
    A SURVEY ON ENHANCING DATA SECURITY ON CLOUD STORAGE USING SPLIT TECHNIQUE
    A Review of Cloud Computing Security Issues
    • 21
    • PDF
    A Dynamic Four-Level Authentication Framework to Enhance Security in Public Cloud Using Hybrid Cellular Automata
    • G. Kumaresan, N. Gopalan
    • Computer Science
    • 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS)
    • 2018
    Data Security in Cloud
    • 1
    • PDF
    Fundamental and Comparative Study of Secure Cloud Computing

    References

    SHOWING 1-10 OF 21 REFERENCES
    Secure storage and access of data in cloud computing
    • 82
    Identity-based distributed cloud storage encryption scheme
    • 3
    A Performance Comparison of Data Encryption Algorithms
    • A. Nadeem, M. Y. Javed
    • Computer Science
    • 2005 International Conference on Information and Communication Technologies
    • 2005
    • 369
    General survey on massive data encryption
    • M. Wang, Guiliang Zhu, X. Zhang
    • Computer Science
    • 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT)
    • 2012
    • 8
    Energy Consumption of Encryption Schemes in Wireless Devices
    • 69
    • PDF
    Arrendond, “Performance Comparison of Elliptic Curve and RSA Digital Signatures
    • 2004