ENHANCING DATA SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER MULTI-CLOUD ENVIRONMENT (original) (raw)

PROVIDING SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER CLOUD STORAGE

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user's concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.

Literature Survey Report Topic: An Efficient Solution Proposed Cloud Computing Security

Cloud computing is regarded as the futuristic technology which is an Internet based technology where quality services are provided to users including data and software, on remote servers.. In this paper we look at the current researches related to data security issues like integrity and confidentiality. Also most importantly Data security issues for cloud storage system in the application process facing, this paper presents secure data storage architecture based on cloud computing. The architecture study security issues of cloud computing from the data storage and data security aspects are proposed based Cache data storage model based on third-party certification and data security mode, thus improving data availability, data transfers from storage the establishment of appropriate protective measures, to achieve effective protection of cloud data.

IJERT-A Review on Clouds Security Based Encryption and Decryption Techniques

International Journal of Engineering Research and Technology (IJERT), 2021

https://www.ijert.org/a-review-on-clouds-security-based-encryption-and-decryption-techniques https://www.ijert.org/research/a-review-on-clouds-security-based-encryption-and-decryption-techniques-IJERTV10IS020122.pdf Today, large amounts of electronic data have been created, and the work of organizations that need data recovery services can suffer from various natural or man-made disasters, which can lead to huge data losses. Encryption and spatial encryption performance and average response time have been estimated based on the size of the data file. RSA encryption is often used in cloud storage. It allows cloud services to search encrypted data directly. Cloud Server provides storage and search services. To perform efficient searches, the cloud uses verification keys to maintain privacy protection or meet authentication requirements and provide equivalent proof of encrypted documents based on tokens. Most security issues are caused by people deliberately creating malicious or malicious purposes. This Paper reviews and examines some Encryption and Decryption technologies. As a result, the better solution to the symmetric key encryption and the asymmetric key encryption is provided. I INTRODUCTION Cloud computing is a distributed community that provides calculating or storage space as services to end users. The architecture / model of cloud computing is that all servers, networks, presentations or other basics connected to the facts centre are accessible to the end users. Cloud computing is upward in attention of technology and business organizations, but this is useful for solving social problems. It can also be beneficial. Cloud computing refers to online operation, configuration and access to applications. It provides online data storage, infrastructure or submissions. Cloud computing allows individuals and businesses to shift the burden by managing large amounts of data or performance processes that require computing for powerful servers. Due to the growing approval of cloud figuring, more or more data proprietors are being encouraged to subcontract their data to cloud attendants in order to provide great convenience and reduce data management costs. Data tenants provide services to many businesses and companies, and they insist on improving data security standards by following a covered method, including following: data encryption, key organization, strong admission controls, or security intellect. The cloud attendant performs query or returns encrypted papers with an additional proof according to the token generated by Data owners. The Data users will receive the result with the corresponding proof so they can verify the correctness and decrypt scrambled leaflets after verification is accurate. Concepts Of Cloud Computing-Cloud computing is an advantage of information technology / business applications. Any organization can gain this benefit by paying or renting usage. Storage, servers and applications belong to the cloud computing area and are prerequisites for on-demand access. Therefore, unlike traditional methods of building data centers, hardware, applications and applications can be executed in a secure way before concentrating on building / transmitting business solutions. Cloud computing eliminates the need for expensive data centers and management because cloud vendors provide, manage and monitor the health and accessibility of the framework. Registering a cloud is an event on the network that allows administrators to provide versatility, quality of service (QoS) and, in most cases, to ensure custom on-demand and low-cost computing infrastructure. These infrastructures can be simple and access in a universal way. Cloud computing is a model used to authorize expedient, on-demand network admission to a public pool of configurable computing value (such as systems, servers, storage, function, or management). These resources can be managed by negligible or cloud Service-fast configuration and release The term "cloud" for vendor interaction is built from the network and its schematic representation is cloud. It refers to various specific types of services or submission that have been communicated in Internet cloud, and in many cases the devices used to get these products and applications require no special applications. Cloud Architecture-The rise of cloud computing is rapidly changing business and innovative ideas and having different effects on different individuals. For utilities and IT customers, IT management (ITaaS)-that is, computing, storage and applications is transferred from the central data centre via the Internet. For Internet and software developers, this is the stage of development of web-scale programming. Operating environment For infrastructure providers and administrators, it is a huge distributed data centre infrastructure that is connected to IP networks. Top layer (application layer): The top application that is delivered as needed according to the software as a service model (SaaS).

Security in Cloud: From Individual to Multi Cloud

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

The use of cloud technology has increased in many businesses.Cloud providers should handle privacy and security concerns as a top priority. Customers are increasingly less interested in dealing with "individual cloud" suppliers due to potential issues such as availability and performance failure and the threat of hostile intruders in the individual cloud. This study focuses on the problems regarding cloud computing's data security. Usage of cloud computing wish to avoid using an unscrupulous cloud provider because their information and data will be transferred with a third party. Protecting sensitive and confidential information from attackers or malicious insiders.

Security issues in Cloud Computing

The increasing of attractiveness of cloud computing among many users in today’s environment is the result of efficiency and success of the services provided by this growing technology. Almost all users including large companies like Google, Amazon and Flip kart employs cloud as the approach of deliver their services to their customers. As all services are migrated to cloud environment for everyone to access them, security of these data and services is critical issue to consider during migration of those services. Different techniques have proposed by different scholars on how the data could to be safe from unauthorized access. In this paper we propose a technique that can improve the security of data, we demonstrate our technique using small implementation to support it and the result of the implementation are tabulated and figured out as were obtained.

Security Issues and Challenges in Cloud Computing

International Conference on Information Engineering, Management and Security 2014, 2014

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider Interaction. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.

Cloud Computing and Security Fundamentals

IJCSMC, 2022

In today’s era almost all the organizations are preferring to use cloud as their primary storage. Once the organization uploads its data to cloud, then the organization has no control over it. Then comes the security challenges in handling data to cloud service providers. While selecting a Cloud Service Provider we need to be aware about that service provider before giving our data because as from now you will not have all the control. This paper gives a better understanding on the concept of cloud computing and the risks that came up after outsourcing data handling tasks. Section 1 is Introduction, Section 2 discusses on various Service Models in Cloud Computing, Section 3 contains Cloud Deployment Models, Section 4 focuses on Security Issues and Challenges in Cloud Computing.

The Proposed Model to Increase Security of Sensitive Data in Cloud Computing

International Journal of Advanced Computer Science and Applications

There is a complex problem regarding security of data in cloud, it becomes more critical when the data in question is highly sensitive. One of the main approaches to overcome this problem is the encryption data at rest, which comes with its own difficulties such as efficient key management, access permissions and similar. In this paper, we propose a new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization. The approach is based on multiple strategies of file encryption, partitioning and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. All details of the strategy used for a particular file are stored on a separate file, which can be considered as a master key for the file contents. Also, we will present each strategy with the results and comments related to the realized measurements.

Security Issues and Challenges in Cloud Computing: A Review

2018

Cloud computing is most demanding technology in the present business scenario. The unique and exciting feature of cloud is pay as you go where user has not to spend money for buying resources hardware as well as software. Cloud incorporates divergent technologies ranging from network, OS ,databases , virtualization, resource sharing, concurrency control and memory management. Consiquently the issues pertaining security of above mentioned technologies are also relevant to cloud computing.As much as the technological benefit cloud computing also involve privacy and security risk. The security is major concern due to which customers avoid migration of data in cloud. This paper analyzes the current security challenges in cloud computing environment and a multilevel encryption based model is reviewed for securing data in cloud.