Sulabha V Patil - Academia.edu (original) (raw)

Papers by Sulabha V Patil

Research paper thumbnail of Analysis Of Various Cbir Techniques For Retriving Forensically Viable Information From The Images

International journal of engineering research and technology, Jan 30, 2013

Image retrieval has been one of the most interesting and vivid research areas in the field of com... more Image retrieval has been one of the most interesting and vivid research areas in the field of computer vision .When the images are geo-tagged the information contained in them constitute an important factor in digital forensics. There are various techniques through which the information stored in an image can be retrieved for forensic evidences. Content-based image retrieval (CBIR) systems are used in order to automatically index, search, retrieve and browse image databases. Color and texture features are important properties in content-based image retrieval systems. In this paper we have mentioned detailed analysis of CBIR system.

Research paper thumbnail of Difficulty In Analysis Of Data In Cloud From Forensic Point Of View

International journal of engineering research and technology, Dec 28, 2012

Cloud environment is offering different services to the users and more and more companies are wor... more Cloud environment is offering different services to the users and more and more companies are working to tap the benefits being provided by this environment. However, the data that is stored in cloud is scattered and is administered by different countries having varied time zones, laws, regulations etc. The distributed data in cloud poses various difficulties from forensic point of view. A comprehensive review of the difficulties in analysis of data in Cloud environments is discussed in this paper.

Research paper thumbnail of Digital Forensic in Cloud: Critical Analysis of Threats and Security in IaaS, SaaS and PaaS and Role of Cloud Service Providers

Cloud computing is inevitable in day to day working and we cannot imagine online activity without... more Cloud computing is inevitable in day to day working and we cannot imagine online activity without its use. Cloud services are offered at different levels in pay per use model. Its characteristics of flexibility, elasticity and reduced costs has enhanced its popularity and use amongst masses. It enable users to work by installing virtual machine thus eliminating the cost of maintaining hardware for computational work. However, important aspect which affected its use is security of users data. Cloud user and service providers are connected via Service Level Agreement. This agreement decides the terms and conditions which both the parties have to adhere to. This paper aims at critical evaluation of various services offered by service providers. It also study security threats and measures suggested by various authors.

Research paper thumbnail of Digital Forensics Technique for Detection of Attack and Previous Data Restoration in Cloud Environment

International journal of advanced research in computer science and software engineering, Jun 30, 2017

Cloud computing recovery issues requirements have been addressed in publications earlier, but it ... more Cloud computing recovery issues requirements have been addressed in publications earlier, but it is still difficult to estimate what kinds of requirements have been researched most, and which are still under research. Backing up our databases to the public cloud is an important strategic focus for us going forward in order to save money, scale our backup and DR operations, and to ensure our applications are always available to customers and business users worldwide. Over the past few years, many organizations have started to deploy public cloud for backup and Disaster Recovery (DR). Data recovery approaches with respect to digital forensics can be introduced for the sake of data management after a system encounters with an attack or any disaster like crash of vital data. These approaches often used by organizations to experience the reactive majors after a crash of data. Cloud-based business flexibility can provide an attractive alternative to traditional disaster recovery, offering rapid recovery time associated with a dedicated infrastructure and the reduced costs that are consistent with a data recovery model. This paper discusses one of the techniques to implement application for DR and describes how organizations can use cloud computing to help plan for both the routine interruptions to service-server hardware failures ,cut power lines, and security breaches-as well as more-infrequent disasters. The paper provides key considerations for the transition of replicas once a peer in the system encounters an attack in the private cloud-based business resilience. That is, a machine, once experiences calamity like instance failure of data and so on, DR can be carried out by an application discussed in this paper to recover the data by extracting a last Restore point (RP).

Research paper thumbnail of Web Mining: A Brief Survey on Data Extraction Techniques

In last few years, we faced problem regarding extraction of data from web pages. In this paper we... more In last few years, we faced problem regarding extraction of data from web pages. In this paper we proposed to address problem of web data extraction techniques related to areas such as natural language processing, language and grammar, machine learning, information retrieval and Ontologies. As consequence they represent very distinct feature and capabilities which make direct comparison difficult to be done.

Research paper thumbnail of Survey on Security Issues in Cloud ComputingEnviro nment

Cloud has introduced a new concept of provision of on-demand resource to services on internet. Cl... more Cloud has introduced a new concept of provision of on-demand resource to services on internet. Cloud provides an attractive model while allowing the service providers to save cost. It allows users to free themselves of tasks of resource management i.e. most efficient use of resources. It also allows centralization of information and resources so that the users can access them from anywhere using the internet. Generally the resources used to provide services belong to a third party. As the users don’t have to invest capital in such resources it decreases costs. Even though cloud model is lucrative, users have been hesitant in adopting it, the major reason being security concern regarding their private data. In this paper we discuss about various security concerns in cloud environment.

Research paper thumbnail of A Survey On Security Issues In Cloud Computing Environment

Cloud computing has become one of the hottest topics in the IT world today. Its model of computin... more Cloud computing has become one of the hottest topics in the IT world today. Its model of computing as a resource has changed the landscape of computing as we know it, and its promises of increased flexibility, greater reliability, massive scalability, and decreased costs have enchanted businesses. Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. This would allow multi-fold increase in the capacity and capabilities of the existing and new software. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Since these datacenters may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. One can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be addressed with respect to security and privacy in a cloud computing environment. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.

Research paper thumbnail of Location based Clustering of Cloud Datasets for Forensic Analysis

Ijca Proceedings on National Conference on Innovative Paradigms in Engineering Technology 2013, Dec 26, 2013

Cloud environment is offering different services to the users and more and more companies are wor... more Cloud environment is offering different services to the users and more and more companies are working to tap the benefits being provided by this environment. Data mining algorithms are proven algorithms to find hidden useful information from large database. K-Means clustering algorithm is one of the very popular and high performance clustering algorithms. The main aim of this work is to implement and deploy K-Means algorithm in Google Cloud using Google App Engine with Cloud SQL.

Research paper thumbnail of Survey on Mobile Phone Forensics: Guidelines and Challenges in Data Preservation and Acquisition

Ijca Proceedings on National Conference on Recent Trends in Computing, May 12, 2012

Research paper thumbnail of Secure Mobile Cloud Computing Using Improved Identity Management Protocol with RC-5 Algorithm

International Journal of Innovation and Scientific Research, Oct 10, 2014

The analysis of the impact of mobile computing on the various services shows how the mobile compu... more The analysis of the impact of mobile computing on the various services shows how the mobile computing has changed each service. As mobile computing has become more popular over the past decade, it has been under continuous development with advances in hardware, software, and network. Mobile computing has various applications in our everyday life. The convergence of Internet and mobile computing enables personalized access to online services anywhere and anytime. Entities (e.g., users, services) have to authenticate themselves to service providers in order to use their services. An entity provides personally identifiable information that uniquely identifies it to a Service Provider. Due to the rapid spread of smart phones and social network service, the use of Interne applications has increased and their need for bandwidth has begun to exceed the capacity of 3G networks. This has caused a reduction in speed and service quality. The increase in mobile network users has caused identity management problems for mobile service providers. Therefore, in this paper, proposed system is designed to overcome this problem Improved Identity Management protocol is used to breaks up loads, which are allowed by the existing Identity Management 3G protocol's mutual authentication via mobile operator process, by sending some parts to an Internet application service provider to enhance mobile and ID management at the service provider and by reducing the network and process loads from information handling and packet transmission. The proposed system used the RC-5 algorithm to increase the speed and security in mobile cloud computing providing private key and public key with existing method and it is fulfilling the needs of cloud users and Providers.

Research paper thumbnail of An Augmentation of Topology Control Algorithm for Energy Saving in WSN Integrated into Street Lighting Control

International Journal of Intelligent Systems and Applications, 2015

Energy saving and improve the life time of the sensor node is main focus in the recent years for ... more Energy saving and improve the life time of the sensor node is main focus in the recent years for the researchers hence one of the application domain (Street light monitoring and controlling) of sensor required attention towards this direction. For contributing in this domain we have proposed a scheme for Street light controlling using distributed topology control (TC). The optimize version of A3 protocol reduces the number of messages send/received by the sensors which ultimately leads to the reduction of energy requirement. Experiments are carried on street light scenario for different no. of nodes by maintaining communication using Zigbee protocol. The performance of our extension is evaluated using, no. of messages send/receive & energy consumed during topology building and our approach is having good results as compared to the approach used for this type of network. communication and sensing range 100m and 20 m respectively. The sink node and remaining nodes is assumed to have the initial energy of 1000mJoule/Node.

Research paper thumbnail of Topology Control in Wireless Sensor Network: An Overview

International Journal of Computer Applications, 2014

Energy saving and improve the life time of the sensor node is main focus in the recent years. The... more Energy saving and improve the life time of the sensor node is main focus in the recent years. The most important technique used in wireless sensor networks to reduce energy consumption is Topology Control (i.e. control the topology by maintaining the communication links between network nodes to maintain the connectivity). In this article, first we overview the recent topology control techniques including future directions followed by performance metrics. Further, our overview help to identify a number of issues for achieving energy efficiency and network lifetime through topology control.

Research paper thumbnail of Double threshold energy aware load balancing in cloud computing

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013

ABSTRACT

Research paper thumbnail of Content based retrieval of geotagged images using wavelet as part of digital forensic

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013

ABSTRACT

Research paper thumbnail of IMPLEMENTATION OF DIGITAL FORENSIC TECHNIQUE FOR CLOUD COMPUTING

Abstract- Cloud computing has penetrated the Information Technology industry deep enough to influ... more Abstract- Cloud computing has penetrated the Information Technology industry deep enough to influence major companies
to adopt it into their mainstream business. A strong thrust on the use of virtualization technology to realize Infrastructure-asa-
Service (IaaS) has led enterprises to leverage subscription-oriented computing capabilities of public Clouds for hosting
their application services. A seldomly discussed, but in this regard highly relevant open issue is the ability to perform digital
investigations. This continues to fuel insecurity on the sides of both providers and customers. In Cloud Forensics, the lack of
physical access to servers constitutes a completely new and disruptive challenge for investigators. Due to the decentralized
nature of data processing in the Cloud, traditional approaches to evidence collection and recovery are no longer practical.
The main disturbing element of the security of the cloud i.e. the DDoS attacks has led to the establishment of various
technologies in order to gain defense against DDoS attacks. This paper gives the implementation of a forensic technique
which detects DDoS attack and is used as a service provided by CSP.

Research paper thumbnail of A Survey On Security Issues In Cloud Computing Environment

Cloud computing has become one of the hottest topics in the IT world today. Its model of computin... more Cloud computing has become one of the hottest topics in the IT world today. Its model of computing as a resource has changed the landscape of computing as we know it, and its promises of increased flexibility, greater reliability, massive scalability, and decreased costs have enchanted businesses. Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. This would allow multi-fold increase in the capacity and capabilities of the existing and new software. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Since these datacenters may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. One can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be addressed with respect to security and privacy in a cloud computing environment. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.

Research paper thumbnail of ENHANCING PRIVACY IN INTERCLOUD INTERACTION

Abstract: In IT industry now a days there is a need for several new resources and storage require... more Abstract: In IT industry now a days there is a need for several new resources and storage requirement for terabyte of data
generated every day. Cloud Computing is a solution for this in a cost effective manner. Cloud Computing provides on demand
resources as services to client. Cloud is highly scalable, flexible and platform in dependable. Although it is benefiting
the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data loss, other authentication
and security issues. In this paper an authentication model is proposed for cloud computing based on Kerberos protocol
using threshold cryptography to provide more security and to increase the availability of key. This model can also benefit by
filtering the unauthorized access and to reduce the burden of computation and memory usage of cloud provider against authentication
checks for each client. It acts as a third party between cloud server and clients to allow authorized and secure
access to cloud services. In this paper we will take a review of related work for cloud security. In next section we will discuss
the proposed architecture and its working.

Research paper thumbnail of Analysis Of Various Cbir Techniques For Retriving Forensically Viable Information From The Images

International journal of engineering research and technology, Jan 30, 2013

Image retrieval has been one of the most interesting and vivid research areas in the field of com... more Image retrieval has been one of the most interesting and vivid research areas in the field of computer vision .When the images are geo-tagged the information contained in them constitute an important factor in digital forensics. There are various techniques through which the information stored in an image can be retrieved for forensic evidences. Content-based image retrieval (CBIR) systems are used in order to automatically index, search, retrieve and browse image databases. Color and texture features are important properties in content-based image retrieval systems. In this paper we have mentioned detailed analysis of CBIR system.

Research paper thumbnail of Difficulty In Analysis Of Data In Cloud From Forensic Point Of View

International journal of engineering research and technology, Dec 28, 2012

Cloud environment is offering different services to the users and more and more companies are wor... more Cloud environment is offering different services to the users and more and more companies are working to tap the benefits being provided by this environment. However, the data that is stored in cloud is scattered and is administered by different countries having varied time zones, laws, regulations etc. The distributed data in cloud poses various difficulties from forensic point of view. A comprehensive review of the difficulties in analysis of data in Cloud environments is discussed in this paper.

Research paper thumbnail of Digital Forensic in Cloud: Critical Analysis of Threats and Security in IaaS, SaaS and PaaS and Role of Cloud Service Providers

Cloud computing is inevitable in day to day working and we cannot imagine online activity without... more Cloud computing is inevitable in day to day working and we cannot imagine online activity without its use. Cloud services are offered at different levels in pay per use model. Its characteristics of flexibility, elasticity and reduced costs has enhanced its popularity and use amongst masses. It enable users to work by installing virtual machine thus eliminating the cost of maintaining hardware for computational work. However, important aspect which affected its use is security of users data. Cloud user and service providers are connected via Service Level Agreement. This agreement decides the terms and conditions which both the parties have to adhere to. This paper aims at critical evaluation of various services offered by service providers. It also study security threats and measures suggested by various authors.

Research paper thumbnail of Digital Forensics Technique for Detection of Attack and Previous Data Restoration in Cloud Environment

International journal of advanced research in computer science and software engineering, Jun 30, 2017

Cloud computing recovery issues requirements have been addressed in publications earlier, but it ... more Cloud computing recovery issues requirements have been addressed in publications earlier, but it is still difficult to estimate what kinds of requirements have been researched most, and which are still under research. Backing up our databases to the public cloud is an important strategic focus for us going forward in order to save money, scale our backup and DR operations, and to ensure our applications are always available to customers and business users worldwide. Over the past few years, many organizations have started to deploy public cloud for backup and Disaster Recovery (DR). Data recovery approaches with respect to digital forensics can be introduced for the sake of data management after a system encounters with an attack or any disaster like crash of vital data. These approaches often used by organizations to experience the reactive majors after a crash of data. Cloud-based business flexibility can provide an attractive alternative to traditional disaster recovery, offering rapid recovery time associated with a dedicated infrastructure and the reduced costs that are consistent with a data recovery model. This paper discusses one of the techniques to implement application for DR and describes how organizations can use cloud computing to help plan for both the routine interruptions to service-server hardware failures ,cut power lines, and security breaches-as well as more-infrequent disasters. The paper provides key considerations for the transition of replicas once a peer in the system encounters an attack in the private cloud-based business resilience. That is, a machine, once experiences calamity like instance failure of data and so on, DR can be carried out by an application discussed in this paper to recover the data by extracting a last Restore point (RP).

Research paper thumbnail of Web Mining: A Brief Survey on Data Extraction Techniques

In last few years, we faced problem regarding extraction of data from web pages. In this paper we... more In last few years, we faced problem regarding extraction of data from web pages. In this paper we proposed to address problem of web data extraction techniques related to areas such as natural language processing, language and grammar, machine learning, information retrieval and Ontologies. As consequence they represent very distinct feature and capabilities which make direct comparison difficult to be done.

Research paper thumbnail of Survey on Security Issues in Cloud ComputingEnviro nment

Cloud has introduced a new concept of provision of on-demand resource to services on internet. Cl... more Cloud has introduced a new concept of provision of on-demand resource to services on internet. Cloud provides an attractive model while allowing the service providers to save cost. It allows users to free themselves of tasks of resource management i.e. most efficient use of resources. It also allows centralization of information and resources so that the users can access them from anywhere using the internet. Generally the resources used to provide services belong to a third party. As the users don’t have to invest capital in such resources it decreases costs. Even though cloud model is lucrative, users have been hesitant in adopting it, the major reason being security concern regarding their private data. In this paper we discuss about various security concerns in cloud environment.

Research paper thumbnail of A Survey On Security Issues In Cloud Computing Environment

Cloud computing has become one of the hottest topics in the IT world today. Its model of computin... more Cloud computing has become one of the hottest topics in the IT world today. Its model of computing as a resource has changed the landscape of computing as we know it, and its promises of increased flexibility, greater reliability, massive scalability, and decreased costs have enchanted businesses. Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. This would allow multi-fold increase in the capacity and capabilities of the existing and new software. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Since these datacenters may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. One can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be addressed with respect to security and privacy in a cloud computing environment. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.

Research paper thumbnail of Location based Clustering of Cloud Datasets for Forensic Analysis

Ijca Proceedings on National Conference on Innovative Paradigms in Engineering Technology 2013, Dec 26, 2013

Cloud environment is offering different services to the users and more and more companies are wor... more Cloud environment is offering different services to the users and more and more companies are working to tap the benefits being provided by this environment. Data mining algorithms are proven algorithms to find hidden useful information from large database. K-Means clustering algorithm is one of the very popular and high performance clustering algorithms. The main aim of this work is to implement and deploy K-Means algorithm in Google Cloud using Google App Engine with Cloud SQL.

Research paper thumbnail of Survey on Mobile Phone Forensics: Guidelines and Challenges in Data Preservation and Acquisition

Ijca Proceedings on National Conference on Recent Trends in Computing, May 12, 2012

Research paper thumbnail of Secure Mobile Cloud Computing Using Improved Identity Management Protocol with RC-5 Algorithm

International Journal of Innovation and Scientific Research, Oct 10, 2014

The analysis of the impact of mobile computing on the various services shows how the mobile compu... more The analysis of the impact of mobile computing on the various services shows how the mobile computing has changed each service. As mobile computing has become more popular over the past decade, it has been under continuous development with advances in hardware, software, and network. Mobile computing has various applications in our everyday life. The convergence of Internet and mobile computing enables personalized access to online services anywhere and anytime. Entities (e.g., users, services) have to authenticate themselves to service providers in order to use their services. An entity provides personally identifiable information that uniquely identifies it to a Service Provider. Due to the rapid spread of smart phones and social network service, the use of Interne applications has increased and their need for bandwidth has begun to exceed the capacity of 3G networks. This has caused a reduction in speed and service quality. The increase in mobile network users has caused identity management problems for mobile service providers. Therefore, in this paper, proposed system is designed to overcome this problem Improved Identity Management protocol is used to breaks up loads, which are allowed by the existing Identity Management 3G protocol's mutual authentication via mobile operator process, by sending some parts to an Internet application service provider to enhance mobile and ID management at the service provider and by reducing the network and process loads from information handling and packet transmission. The proposed system used the RC-5 algorithm to increase the speed and security in mobile cloud computing providing private key and public key with existing method and it is fulfilling the needs of cloud users and Providers.

Research paper thumbnail of An Augmentation of Topology Control Algorithm for Energy Saving in WSN Integrated into Street Lighting Control

International Journal of Intelligent Systems and Applications, 2015

Energy saving and improve the life time of the sensor node is main focus in the recent years for ... more Energy saving and improve the life time of the sensor node is main focus in the recent years for the researchers hence one of the application domain (Street light monitoring and controlling) of sensor required attention towards this direction. For contributing in this domain we have proposed a scheme for Street light controlling using distributed topology control (TC). The optimize version of A3 protocol reduces the number of messages send/received by the sensors which ultimately leads to the reduction of energy requirement. Experiments are carried on street light scenario for different no. of nodes by maintaining communication using Zigbee protocol. The performance of our extension is evaluated using, no. of messages send/receive & energy consumed during topology building and our approach is having good results as compared to the approach used for this type of network. communication and sensing range 100m and 20 m respectively. The sink node and remaining nodes is assumed to have the initial energy of 1000mJoule/Node.

Research paper thumbnail of Topology Control in Wireless Sensor Network: An Overview

International Journal of Computer Applications, 2014

Energy saving and improve the life time of the sensor node is main focus in the recent years. The... more Energy saving and improve the life time of the sensor node is main focus in the recent years. The most important technique used in wireless sensor networks to reduce energy consumption is Topology Control (i.e. control the topology by maintaining the communication links between network nodes to maintain the connectivity). In this article, first we overview the recent topology control techniques including future directions followed by performance metrics. Further, our overview help to identify a number of issues for achieving energy efficiency and network lifetime through topology control.

Research paper thumbnail of Double threshold energy aware load balancing in cloud computing

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013

ABSTRACT

Research paper thumbnail of Content based retrieval of geotagged images using wavelet as part of digital forensic

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013

ABSTRACT

Research paper thumbnail of IMPLEMENTATION OF DIGITAL FORENSIC TECHNIQUE FOR CLOUD COMPUTING

Abstract- Cloud computing has penetrated the Information Technology industry deep enough to influ... more Abstract- Cloud computing has penetrated the Information Technology industry deep enough to influence major companies
to adopt it into their mainstream business. A strong thrust on the use of virtualization technology to realize Infrastructure-asa-
Service (IaaS) has led enterprises to leverage subscription-oriented computing capabilities of public Clouds for hosting
their application services. A seldomly discussed, but in this regard highly relevant open issue is the ability to perform digital
investigations. This continues to fuel insecurity on the sides of both providers and customers. In Cloud Forensics, the lack of
physical access to servers constitutes a completely new and disruptive challenge for investigators. Due to the decentralized
nature of data processing in the Cloud, traditional approaches to evidence collection and recovery are no longer practical.
The main disturbing element of the security of the cloud i.e. the DDoS attacks has led to the establishment of various
technologies in order to gain defense against DDoS attacks. This paper gives the implementation of a forensic technique
which detects DDoS attack and is used as a service provided by CSP.

Research paper thumbnail of A Survey On Security Issues In Cloud Computing Environment

Cloud computing has become one of the hottest topics in the IT world today. Its model of computin... more Cloud computing has become one of the hottest topics in the IT world today. Its model of computing as a resource has changed the landscape of computing as we know it, and its promises of increased flexibility, greater reliability, massive scalability, and decreased costs have enchanted businesses. Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. This would allow multi-fold increase in the capacity and capabilities of the existing and new software. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Since these datacenters may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. One can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be addressed with respect to security and privacy in a cloud computing environment. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.

Research paper thumbnail of ENHANCING PRIVACY IN INTERCLOUD INTERACTION

Abstract: In IT industry now a days there is a need for several new resources and storage require... more Abstract: In IT industry now a days there is a need for several new resources and storage requirement for terabyte of data
generated every day. Cloud Computing is a solution for this in a cost effective manner. Cloud Computing provides on demand
resources as services to client. Cloud is highly scalable, flexible and platform in dependable. Although it is benefiting
the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data loss, other authentication
and security issues. In this paper an authentication model is proposed for cloud computing based on Kerberos protocol
using threshold cryptography to provide more security and to increase the availability of key. This model can also benefit by
filtering the unauthorized access and to reduce the burden of computation and memory usage of cloud provider against authentication
checks for each client. It acts as a third party between cloud server and clients to allow authorized and secure
access to cloud services. In this paper we will take a review of related work for cloud security. In next section we will discuss
the proposed architecture and its working.