IJERT-Cloud Security Using Authentication And File Base Encryption (original) (raw)

Literature Survey Report Topic: An Efficient Solution Proposed Cloud Computing Security

Cloud computing is regarded as the futuristic technology which is an Internet based technology where quality services are provided to users including data and software, on remote servers.. In this paper we look at the current researches related to data security issues like integrity and confidentiality. Also most importantly Data security issues for cloud storage system in the application process facing, this paper presents secure data storage architecture based on cloud computing. The architecture study security issues of cloud computing from the data storage and data security aspects are proposed based Cache data storage model based on third-party certification and data security mode, thus improving data availability, data transfers from storage the establishment of appropriate protective measures, to achieve effective protection of cloud data.

Research on Cloud Data Storage Security

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

Cloud computing is a revolutionary mechanism that changing way to enterprise hardware and software design and procurements. Because of cloud simplicity everyone is moving data and application software to cloud data centers there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing. This paper gives an overview of the security issues on data storage along with its possible solutions many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud. This paper also provides a process to avoid Collusion attacks of server modification by unauthorized users.

Cloud Computing: Ensuring Data Storage Security in Cloud

International Journal of Engineering Development and Research, 2016

Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...

Analysis of Cloud Storage Information Security and It�s Various Methods

International Journal on Recent and Innovation Trends in Computing and Communication, 2015

Cloud computing is the latest paradigm in IT field promising trends. It provides the resources similar to accessibility of data, minimum cost and several other uses. But the major issue for cloud is the security of the information which is stored in the cloud. Various methods and specialized techniques are combined together for providing information security to data which is stored in cloud in this paper. The aim of this paper is to analyze various cryptographic techniques and to discuss about various security techniques over cloud and user authentication which is most helpful and useful in the information security over cloud.

Study of Cloud Computing and its Data Storage Security Issues

Cloud computing offers online on demand services to its clients. Data storage is among one of the primary services offered by cloud computing. Cloud service facilitator hosts the data of the client on their server and client can access their data from these servers. As data, owners and servers are different identities, the standard of data storage calls upon many security challenges. In this paper, we will study cloud computing and its storage security issues

A Review Paper on "Data security issues in cloud computing"

Cloud computing offers a prominent provider for facts garage called cloud storage. The go with the flow and garage of facts on the cloud environment in simple textual content format can be main protection threat. So, it is the duty of cloud provider vendors to make certain private and protection of facts on storage in addition to network level. The following three parameters confidentiality, integrity and availability determine whether protection and private of statistics saved on cloud environment is maintained or not. The proposed work is to outline cloud structure with configured samba storage and cryptographic encryption techniques. The cloud architecture deployed with samba storage makes use of operating gadget feature specifying permission values for 3 attributes (User/Owner, Group and Global) and maps it to cryptographic utility which plays cryptographic operations. Cryptography software supports symmetric and uneven encryption algorithm to encrypt/decrypt data for uploading/downloading within cloud storage. A username and password based totally authentication mechanism for users and virtual signature scheme for information authenticity are defined inside cloud architecture.

Cloud Computing Security using by Applying Cryptography Technique

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020

Cloud computing is the provision of computing and storage capacity to users as a service. Cloud storage is a type of networked online storage where data is stored in virtualized storage pools as a subservice of infrastructure as a service (IaaS) in cloud computing. Cloud computing plays a significant role in the efficient use of resources and in the utilization of service. Regardless of the cloud category (e.g. private, public, hybrid or inter-cloud), all service providers rely on domain server data. As a rapid development and deployment of cloud computing and cloud storage, users are increasingly concerned about security and privacy issues involved in these techniques. This paper provides a summary of basic security problems that consist of conventional security issues. It also addresses the additional challenges resulting from the cloud computing paradigm being used by cloud system providers and consumers. In addition, solutions suggested by some researchers are presented with a focus on cryptographic techniques which support secure storage of the cloud.

Study and improved data storage in cloud computing using cryptography

2021

Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-ofthe art deployment and research challenges. Due to security issues, information over the Internet is becoming important. We have suggested a method to protect critical file data. Cryptography algorithms are an efficient way to encrypt sensitive data. It is a retrieval and transmission system that is readable only by intended users. The low cost and data usability of cloud computing is advantageous. Cloud storage has many advantages at low cost and data connectivity through the Internet. Ensured cloud data protection is an important part of the cloud computing environment because customers often store sensitive information with cloud storage services but they are not secure services. So, it remains a challenge to exchange data in a safe way while storing data from an unc...

Advanced File Based Security Mechanism in Cloud Computing: A Review

International Journal of Computers Technology, 2015

Cloud computing is a broad solution that delivers IT as a service. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authority's request. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. In this paper the attempt to secure data from unauthorized access. The Method of data security is AES algorithm for providing data security by encrypting the given data based on the AES. It is based on a design principle known as a substitution-permutation network, and is fast in both Software and Hardware. The algorithms used in AES are so simple that they can be easily implemented using heap processors and a minimum amount of memory and this data then can only be decrypted by authorized person by using his private key.

Strong and Secure Mechanism for Data Storage in Cloud Environment

World Academy of Research in Science and Engineering, 2019

This present research paper proposes the security is frequently referred to as a standout among the most unlimited issues in the cloud processing as distributed computing gives a helpful and huge measure of capacity information at extremely low and effective expense so searching for a legitimate wellbeing measures is basic. It is contended that the Cloud is proposed to deal with a lot of information, along these lines aggressors can be search for taking out the information as it includes different data's being put away. A many customers are surfing cloud for diverse purposes hence they need profoundly protected & persevering administrations. The developing of cloud is growing day by day which utilizes the additional level of protection and validation. We propose a basic information assurance model where information is encoded utilizing MD5 with RSA and Authenticated by Diffie-Hellman calculation prior to it is propelled in the cloud, therefore guaranteeing data privacy and security.