Open Access   Article Go Back

A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data

Kiran Prajapati1 , Jaytrilok Choudhary2

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 1-6, May-2015

Online published on May 30, 2015

Copyright © Kiran Prajapati, Jaytrilok Choudhary . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kiran Prajapati, Jaytrilok Choudhary, “A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.1-6, 2015.

MLA Style Citation: Kiran Prajapati, Jaytrilok Choudhary "A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data." International Journal of Computer Sciences and Engineering 3.5 (2015): 1-6.

APA Style Citation: Kiran Prajapati, Jaytrilok Choudhary, (2015). A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data. International Journal of Computer Sciences and Engineering, 3(5), 1-6.

BibTex Style Citation:
@article{Prajapati_2015,
author = {Kiran Prajapati, Jaytrilok Choudhary},
title = {A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {1-6},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=468},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=468
TI - A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data
T2 - International Journal of Computer Sciences and Engineering
AU - Kiran Prajapati, Jaytrilok Choudhary
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 1-6
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2712 2530 downloads 2536 downloads
  
  
           

Abstract

Cloud provides facility of assigning data to a great number of scattered computers, rather than local computer or remote server. This paper briefly surveys the issues in cloud computing security. The fact is that the data shared with the cloud service provider is identified as the core scientific problem that separates cloud computing security from other topics in computing environment. The paper also describes different encryption techniques to secure the cloud data from unauthorized users.

Key-Words / Index Term

Component Cloud computing security, Obstacles in cloud, Attribute based encryption, Homomorphic encryption.

References

[1] Huth and J. Cebula, “The Basics of Cloud Computing,” Carnegie Mellon University. pp. 1–4, 2011 [Online].
[2] S. Marston, Z. Li, S. Bandyopadhyay, J.Zhang, and A. Ghalsasi, “Cloud computing the business perspective,” Decis. Support Syst.,vol. 51, no. 1, pp. 176–189, Apr. 2011.
[3] P. Mell, T. Grance, and T. Grance, “The NIST Definition of Cloud Computing” Recommendations of the National Institute Of Standards and Technology, pp. 800-145, September 2011.
[4] P. G. Dorey and a. Leite, “Commentary: Cloud computing – A security problem or solution?”Inf. Secur. Tech. Rep., vol. 16,no. 3–4, pp. 89–96, Aug. 2011.
[5] M. Armbrust, A. D. Joseph, R. H. Katz, and D. A. Patterson, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley pp. 14-19, February 10, 2009.
[6] B. J. Brodkin, N. W. Cloud, S. Risks, C. Computing, and G. A. Engine, “Gartner: Seven cloud-computing security risks,” pp. 2–3, 2008.
[7] C. Lee, P. Chung, and M. Hwang, “A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments,” vol. 15, no. 4, pp. 231–240, 2013.
[8] N. York, “Securing the cloud with homomorphic encryption,” vol. 20, no. 3, pp. 1–4, 2014.
[9] M. Tibouchi, “Fully Homomorphic Encryption over the Integers: From Theory to Practice,” pp. 1–4, 2014.
[10] A. Atayero and O. Feyisetan, “Security Issues in Cloud Computing : The Potentials of Homomorphic Encryption,” vol. 2, no. 10, pp. 546–552, 2011.
[11] M. Tebaa, S. E. L. Hajji, and A. E. L. Ghazi,“Homomorphic Encryption Applied to the Cloud Computing Security,” vol. 1, pp. 8–11, 2012.