An Enhanced Data Storage Technique on Cloud Computing

Main Article Content

Dr. Kamlesh Sharma
Nidhi Garg

Abstract

Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A Cloud storage system is basically a storage system over a large scale that consist of many independent storage servers. During recent years a huge changes and adoption is seen in cloud computing so security has become one of the major concerns in it. As Cloud computing works on third party system so security concern is there not only for customers but also for service providers. In this paper we have discussed about Cryptography i.e., encrypting messages into certain forms, it’s algorithms including symmetric and asymmetric algorithm and hashing, its architecture, and advantages of cryptography.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Dr. Kamlesh Sharma and Nidhi Garg , Trans., “An Enhanced Data Storage Technique on Cloud Computing”, IJDCN, vol. 1, no. 3, pp. 1–4, Oct. 2023, doi: 10.54105/ijdcn.B5007.061321.
Section
Articles

How to Cite

[1]
Dr. Kamlesh Sharma and Nidhi Garg , Trans., “An Enhanced Data Storage Technique on Cloud Computing”, IJDCN, vol. 1, no. 3, pp. 1–4, Oct. 2023, doi: 10.54105/ijdcn.B5007.061321.
Share |

References

Rishav Chatterjee, Sharmistha Roy, “Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud”, IJESC, Vol 7, Issue No. 5, Pg. 11818-11821.

S.Poonkodi, V.Kavitha, K.Suresh, “Providing a Secure Data Forwarding In Cloud Storage System Using Threshold Proxy Re-Encryption Scheme”, IJETAE, International Conference on Information Systems and Computing (ICISC-2013), INDIA. Pg-468-472, (ISSN 2250-2459 (Online).

SECURE CLOUD STORAGE Mahima Joshi, Yudhveer Singh Moudgil

P. Druschel and A. Rowstron, “PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility,” Proc. Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75-80, 2001.

Sanjoli Singla, Jasmeet Singh ,”Cloud computing security using encryption technique”, IJARCET, vol.2, ISSUE 7.

Towards Secure Cloud Storage SeongHan Shin and Kazukuni Kobara

Official Arbitration with Secure Cloud Storage Application, Alptekin Ku¨p¸cu¨ Ko¸c University, ˙Istanbul, Turkey

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” ACM Trans. Information and System Security, vol. 9, no. 1, pp. 1-30, 2006. [CrossRef]

Bokefode Jayant.D, Ubale Swapnaja A, Pingale Subhash V., Karane Kailash J. , Apate Sulabha S. ,”Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role bases Access Control Model”, International Journal of Computer Applications, Volume 118-No.12, May2015 [CrossRef]

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA, K.Govinda, V.Gurunathaprasad, H.Sathishkumar

A Survey of Various Techniques to Secure Cloud Storage, Satyendra Singh Rawat, Mr. Alpesh Soni

J. Shao and Z. Cao, “CCA-Secure Proxy Re-Encryption without Pairings,” Proc. 12th Int’l Conf. Practice and Theory in Public Key Cryptography (PKC), pp. 357-376, 2009. [CrossRef]

Rashmi Nigoti, Manoj Jhuria, Dr. Shailendra Singh, “A survey of Cryptographic algorithms for cloud computing”, International Journal of Emerging Technologies in Computational and Applied Sciences, March 2013, ISSN (online)-2279-0055.

R. Bala Chandar, M. S. Kavitha , K. Seenivasan,” Aproficient model for high end security in cloud computing”, International Journal of Emerging Research in Management &Technology, Vol.5, Issue 10.

Karun Handa, Uma Singh,” Data Security in Cloud Computing using Encryption and Steganography”, International Journal of Computer Science and Mobile Computing”, Vol.4 Issue.5, May-2015, pg.786-791

Douglas R. Stinson,” Cryptography: Theory& Practice”,Chapman and Hall Publications.

J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, “Oceanstore: An Architecture for Global-Scale Persistent Storage,” Proc. Ninth Int’l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190- 201, 2000. [CrossRef]

Aarti P Pimpalkar, Prof. H.A. Hingoliwala, “A Secure Cloud Storage System with Secure Data Forwarding”, International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 3002, ISSN 2229-5518.

Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer, “Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment,” Proc. Fifth Symp. Operating System Design and Implementation (OSDI), pp. 1-14, 2002. [CrossRef]

Most read articles by the same author(s)

1 2 3 4 > >>