• Corpus ID: 6865247

Enhanced Security Architecture for Cloud Data Security

@inproceedings{Kant2013EnhancedSA,
  title={Enhanced Security Architecture for Cloud Data Security},
  author={Chander Kant and Yogesh Sharma},
  year={2013}
}
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability decide whether security and privacy of data stored on cloud environment is maintained or not. The… 

Figures and Tables from this paper

Multilevel Security Approach for Cloud Data Storage
TLDR
A novel approach to cloud security is to implement by using multilevel security system that combines cryptography, session management, log management system, and multi level security system to reduce the malicious activity and increase the security level in the cloud storage.
Multilevel Security for Cloud Storage using Encryption Algorithms
TLDR
This research paper proposes an algorithm called Multilevel algorithm by using which an unauthorized user cannot access or modify the data or calculations of cloud, to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.
Analysis of Encryption Algorithms in Cloud Computing
TLDR
As the most promising cloud computing approach, this paper suggests selective encryption techniques, which almost gives the data confidentiality just like private cloud models.
Security in Cloud Computing usingCryptographic Algorithms
TLDR
The proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.
Enhanced data security model for cloud using ECC algorithm and third party auditor
TLDR
Elliptic Curve Cryptography is proposed that owes a strong mathematical structure that raises the confidentiality level to an exceptionally high standard using minimum resources as compared to other existing algorithms like RSA, DES, AES etc., making it a first choice for devices with limited computing ability.
A SURVEY ON ENHANCING DATA SECURITY ON CLOUD STORAGE USING SPLIT TECHNIQUE
TLDR
This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment.
THREE LEVEL AUTHENTICATION SYSTEM TO ENHANCE SECURITY ON CLOUD USING K-MEAN CLUSTERING TECHNIQUE
TLDR
The authors preserved privacy in data storage by validating through IP based detection, Geographical location based security technique, and constant key length encryption technique irrespective of users is used to secure data on cloud storage.
Enhancement of Security in Cloud using Hybrid Encryption Technique
TLDR
This hybrid technique is a two way secured data encryption system, which focusses on the matters related to user’s privacy, authentication and accuracy, and offers more security along with authentication in comparison to other hybrid algorithm given in literature.
The data intactness of efficient audit service outsourcing for data integrity in clouds
  • U. Veeresh, G. Kumar, S. Asif
  • Computer Science
    SEVENTH INTERNATIONAL SYMPOSIUM ON NEGATIVE IONS, BEAMS AND SOURCES (NIBS 2020)
  • 2021
TLDR
This article focuses on cloud server information security and integrity, the protection of cloud-specified information in relation to running computing servers stored in cloud computing.
Novel cryptographic approach to enhance cloud data security
TLDR
A method to generate the most secured cryptographic keys using the blend of two key derivation functions PBKDF2 and Argon 2 is proposed, where there would be no need to store and send key for encryption and decryption.
...
...

References

SHOWING 1-10 OF 21 REFERENCES
Secure storage and access of data in cloud computing
TLDR
This paper proposes a method that allows user to store and access the data securely from the cloud storage and ensures the security and privacy of data stored on cloud.
Identity-based distributed cloud storage encryption scheme
  • Bao Zhang, Changgen Peng, Zhipin Xu
  • Computer Science
    The Proceedings of 2011 9th International Conference on Reliability, Maintainability and Safety
  • 2011
TLDR
An identity-based distributed encryption scheme is proposed in this paper to ensure the privacy safety of the cloud storage and is more suitable for the privacy-preserving of mass users.
Evaluation and Comparison of Security Issues on Cloud Computing Environment
TLDR
The performance of different security algorithm on a cloud network and also on a single processor for different input sizes and advanced Encryption Standard security algorithm implemented for ensuring security framework are described.
A Performance Comparison of Data Encryption Algorithms
  • A. Nadeem, M. Javed
  • Computer Science
    2005 International Conference on Information and Communication Technologies
  • 2005
TLDR
It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms.
Performance Evaluation of Symmetric Encryption Algorithms
TLDR
Evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, DES, 3DES, RC2, Blowfish, and RC6 to demonstrate the effectiveness of each algorithm.
General survey on massive data encryption
TLDR
This paper discusses the encryption principles, advantages and disadvantages of some mainstream massive data encryption technologies, i.e., the encryption technology based on modern cryptosystem, the encryptiontechnology based on parallel and distributed computing, theryption technologybased on biological engineering, and Attribute-basedmassive data encryption technology.
Arrendond, “Performance Comparison of Elliptic Curve and RSA Digital Signatures
  • 2004
Data Security in Cloud Computing with Elliptic Curve Cryptography
TLDR
Data security of cloud in cloud computing is explored by implementing digital signature and encryption with elliptic curve cryptography to reduce costs associated with computing while increasing scalability and flexibility for computing services.
Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography
TLDR
S symmetric and asymmetric cryptographic algorithms are adopted for the optimization of data security in cloud computing and to ensure data confidentiality, integrity and authentication.
Energy Consumption of Encryption Schemes in Wireless Devices
TLDR
The research work carried out in this thesis, provides results that encourage having encryption schemes as software implementation in Wireless LANs and provides results reflecting the advantages of doing so.
...
...