• Corpus ID: 14335275

Providing Data Protection as a Service in Cloud Computing

@inproceedings{Cherian2013ProvidingDP,
  title={Providing Data Protection as a Service in Cloud Computing},
  author={Sunu Alice Cherian and Kavitha Murukezhan},
  year={2013}
}
Data protection in cloud has become an unavoidable and tremendously increasing technology. [] Key Method User authentication is provided using alphanumeric password and graphical password, security is provided using encryption of the file using key. Key management is an important concept used for the protection of data. Overall transactions are viewed by an auditor. Here multilevel data protection is guaranteed for the cloud users.
9 Citations

Figures from this paper

Detailed Review of Different Security Techniques for Data Protection in Cloud Computing
TLDR
Data protection is one among the foremost important security issues, because organizations won’t relocate its data to remote machines if there isn't any guaranteed data protection from the cloud service providers.
Security of Data in Cloud Environment Using DPaaS
TLDR
The various security challenges have been highlighted and the various necessary metrics required for designing DPaaS have been investigated and a solution to make existing developed applications for simple cloud Systems compatible with DPAAS is proposed.
Data Protection On Cloud With MultiSet Partitions
TLDR
It is a suite of security primitives offered by a cloud platform, which enforces data security and privacy and offers evidence of privacy to data owners, even in the presence of potentially uncompromised or malicious applications.
SURVEY ON DATA SECURITY BY USING SECURE REPLICATION IN CLOUD
TLDR
This paper presents the secure approach that encrypt and replicate the data in distributed data server storage system, which involves the replication and storage of data.
TECHNIQUES TO SLICE THE PASSWORD FOR PRESERVING THE PRIVACY IN CLOUD COMPUTING
TLDR
Graphical passwords have been designed to try to make passwords more memorable and easier for people to use and, therefore, more secure.
Cloud Computing and Data Protection Challenges
TLDR
This paper tries to find out the risk and challenges to protect data in public cloud and proposes a strategy to address these challenges.
Survey Paper on Critical Section & Privacy Issue In Cloud Computing
TLDR
A comparative research analysis of the existing research work with reference to the data security and privacy protection techniques used in the cloud computing environment is made.
Research Article Impact Factor: 4.226 ISSN: 2319-507X Faizan I. Khandwani, IJPRET, 2015; Volume 3 (9): 449-455 IJPRET
TLDR
A pool of abstracted, highly scalable, and managed compute infrastructure capable of hosting end-customer applications and billed by consumption for dynamically scalable infrastructure for application, data and file storage.

References

SHOWING 1-10 OF 66 REFERENCES
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
TLDR
This paper examines the problem of protecting data for all users, and not just for some, and uses broad applicability as the driving goal, and explores the challenges and promises of reaching towards that goal with efficiency and high assurance.
Fully homomorphic encryption using ideal lattices
TLDR
This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Robust discretization, with an application to graphical passwords
TLDR
This work presents a discretization method which is tolerant to uncertainties (described by an error distance r, which can be adjusted to the applications), which enables to implement very flexible graphical password schemes, and digital watermarking.
Quantitative information flow as network flow capacity
TLDR
A new technique for determining how much information about a program's secret inputs is revealed by its public outputs is presented, which achieves a more precise quantitative result by computing a maximum flow of information between the inputs and outputs.
The Differential Privacy Frontier (Extended Abstract)
TLDR
The definition of differential privacy is reviewed and a handful of very recent contributions to the differential privacy frontier are surveyed.
Earrthworm diversity and habitat preferences in arid regions of Rajasthan
TLDR
The occurrence of most of the species in sewage soil as compared to other pedoecosystems may be related to high organic carbon and much higher nitrogen of the sewage system.
Earthworms (Oligochaeta) from islands of the south-western Pacific, and a note on two species from Papua New Guinea
TLDR
Earthworms collected from the southwestern Pacific islands of Samoa, Tonga, Fiji, Niue, and the Kermadecs on the 1980 expedition of the Soviet Research Ship Kallisto, and by other expeditions and surveys, are discussed and a key to the earthworms recorded from the south-western Pacific is provided.
Population dynamics of earthworms (Oligochaeta) in cultivated soils of central Himalayan tarai region
TLDR
Earthworm population dynamics was studied in a cultivated soil at Shantipuri and showed positive correlations between soil moisture and worm biomass and age structure of earthworms indicated that clitellates were more abundant than aclitellate during the wet periods (June-October).
Earthworms from northern Indian states with Ocnerodrilus occidentalis Eisen, 1878 as a new report from Punjab
TLDR
This note lists thirty species of earthworms including twenty from Punjab and the Union Territory of Chandigarh and reports Ocnerodrilus occidentalis Eisen (1878) as new record from Punjab.
Illustrations of earthworms occurring in and around Chennai, India
TLDR
Earthworm species collected from Chennai and its environs were identified using existing taxonomic keys and a brief guide for identification by budding vermiculturists was prepared.
...
...