A Review Paper on "Data security issues in cloud computing" (original) (raw)
Related papers
Strong and Secure Mechanism for Data Storage in Cloud Environment
World Academy of Research in Science and Engineering, 2019
This present research paper proposes the security is frequently referred to as a standout among the most unlimited issues in the cloud processing as distributed computing gives a helpful and huge measure of capacity information at extremely low and effective expense so searching for a legitimate wellbeing measures is basic. It is contended that the Cloud is proposed to deal with a lot of information, along these lines aggressors can be search for taking out the information as it includes different data's being put away. A many customers are surfing cloud for diverse purposes hence they need profoundly protected & persevering administrations. The developing of cloud is growing day by day which utilizes the additional level of protection and validation. We propose a basic information assurance model where information is encoded utilizing MD5 with RSA and Authenticated by Diffie-Hellman calculation prior to it is propelled in the cloud, therefore guaranteeing data privacy and security.
Research on Cloud Data Storage Security
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Cloud computing is a revolutionary mechanism that changing way to enterprise hardware and software design and procurements. Because of cloud simplicity everyone is moving data and application software to cloud data centers there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing. This paper gives an overview of the security issues on data storage along with its possible solutions many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud. This paper also provides a process to avoid Collusion attacks of server modification by unauthorized users.
A Research Paper on Data Storage and Security in Cloud Computing
International Journal for Research in Applied Science and Engineering Technology
cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud computing moves the application software and data bases to the large data centers, where the management of the data and services may not be fully trustworthy. This poses many new security challenges which have not been fully implemented. In this paper, we mainly focus on aspects for providing security for data storage in cloud, also architecture for data storage that are implemented by other service providers vendors in cloud, key points for proving security for data storage.
IJERT-Cloud Security Using Authentication And File Base Encryption
International Journal of Engineering Research and Technology (IJERT), 2012
https://www.ijert.org/cloud-security-using-authentication-and-file-base-encryption https://www.ijert.org/research/cloud-security-using-authentication-and-file-base-encryption-IJERTV1IS10196.pdf Nowadays cloud computing word become famous in IT field, where user can store their data online and access any time and any where according to their requirement. World's giant companies Amazon, Google and Microsoft provide cloud services to their customers. Although there are many advantages of cloud computing but some business-critical applications, especially large enterprises, still less trusted on cloud and wouldn't move their data on cloud because of security concerns. However, privacy and security issues become strong barrier for user to accept cloud computing system. This paper briefly introduced about cloud computing and its key terms. In particularly, we intend to discuss cloud security requirement and data privacy issues. We proposed encryption technique like SHA encryption algorithm to provide data privacy and security in the cloud. Also provide some authentication for storage data within cloud.
Cloud Computing: Ensuring Data Storage Security in Cloud
International Journal of Engineering Development and Research, 2016
Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...
Secure File Storage & Sharing on Cloud Using Cryptography
2021
In today’s world, simply having the capacity to transfer a file from one location to another isn’t enough. Businesses today face multiple security threats and a highly competitive environment. So they need a secure file transfer system to protect and reliably transfer their sensitive, business-critical data. Secure file transfer is a method of data sharing via a secure, reliable delivery method. Also, we use this between a client and a server. Cryptography is a technique that we use for securing information and communication in the presence of third parties. We use this technique to ensure that only those persons to whom the information is intended can read this. By using cryptography, we can prevent unauthorized users from accessing the information which is shared privately. In this paper, the plan proposed is to overcome the issues regarding the data that are being stored by the users on the cloud should be encrypted rather than storing them in a plain form such that the data will...
Data security in cloud environment using cryptographic mechanism
Bulletin of Electrical Engineering and Informatics, 2023
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in public and private clouds using various encryption methods. The suggested data security paradigm offers various advantages to both consumers and providers in terms of data security. Three symmetric encryption methods are offered as a service in the cloud. The concept is implemented as a cloud-based application hosted in the cloud, and the effectiveness of three strategies is assessed. They are evaluated in terms of performance and security. Using the recommended encryption methods in a hybrid cloud environment is more efficient than using other methods. The proposed technique can be used for relational data. It can be modified and enhanced to process multimedia data.
Cloud Storage and Security Overview
2018
Cloud storage is one of the cloud services, it allows users to store and manage their data remotely in the cloud. Nowadays, cloud storage has become an attractive storage scheme for users to store their data. When users store their files remotely in a cloud storage system, they still worried about the security of their files and the guarantee of the confidentiality and the integrity of them. In this work, we propose a study of cloud storage and the problem of security in this service. For that, first, we give an overview of this concept, second, we talk about the problem of security in cloud storage, and then we summarize the different techniques and methods that have been proposed in order to ensure the security in cloud
Security of Data Storage in Cloud Computing
International Journal of Computer Applications, 2015
With the advent of Information Technology in day-today activities, the need for online services such as storage space, software, platforms etc. is increasing rapidly. This lead to the rise of a new concept, the Cloud Computing. The Internet users rely heavily on the Cloud Computing for various computing resources. The main motive of the Cloud Providers is to provide these services in a virtualized manner. One of the main concern of cloud computing is the security of the Cloud Storage. When it comes to security of the data stored in the Cloud Storage, it is entirely in the hands of the Cloud Providers. The Cloud Providers assures the consumer of the Cloud that the data stored on their servers is safe. The consumer plays no role in securing the data. The various cloud providers claim that they provide highly secure cloud storage. But there have been attacks on hot-shot cloud providing companies such as Google, Salesforce.com and Dropbox[1]. Many cloud providers employee third party companies which has led to consumer losing their trust with these companies. Thus, the encryption techniques and the various security measures employed by the cloud providers should be equally strong. The privacy and security of cloud computing depend primarily on whether the provider has implement adequate and robust security controls as desired by the customer or not. In this paper we analyze the different security issues related to the cloud and different cryptographic algorithms to secure the cloud.
Design and Implementation of Secure File Storage using Distributed Cloud Mechanism
2019
Cloud computing and the cloud based services like storage and application are the most demanding resources over the internet from few years. With better network or internet connectivity these become very easy tools for remotely managing the information and the files. As the system introduced it comes along with multiple issues and threats also. Even after having better network security mechanism, data protection algorithm, information privacy system service provider can’t ensure full proof solution for information security. Let’s ignore the security about the network transfer and other part; finally file resides at particular storage with company ownership which may be called storage service provider and the company employee with higher authorities having always access to customer’s files. Here the proposed solution deals with the malicious user attack security and prevent file access by utilizing the multiple cloud environment for storing files.