Open Access   Article Go Back

Algorithmic Approach To Cloud Data Security

G. Shukla1 , P. Srivastava2 , R. Kesarwani3 , H. Neyaz4

  1. Dept.CSE, Shambhunath Institute of Engineering & Technology, Dr. A.P.J Abdul Kalam Technical University, Allahabad, India.
  2. Dept.CSE, Shambhunath Institute of Engineering & Technology, Dr. A.P.J Abdul Kalam Technical University, Allahabad, India.
  3. Dept.CSE, Shambhunath Institute of Engineering & Technology, Dr. A.P.J Abdul Kalam Technical University, Allahabad, India.
  4. Dept.CSE, Shambhunath Institute of Engineering & Technology, Dr. A.P.J Abdul Kalam Technical University, Allahabad, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-4 , Page no. 194-199, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i4.194199

Online published on Apr 30, 2018

Copyright © G. Shukla, P. Srivastava, R. Kesarwani, H. Neyaz . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Shukla, P. Srivastava, R. Kesarwani, H. Neyaz, “Algorithmic Approach To Cloud Data Security,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.194-199, 2018.

MLA Style Citation: G. Shukla, P. Srivastava, R. Kesarwani, H. Neyaz "Algorithmic Approach To Cloud Data Security." International Journal of Computer Sciences and Engineering 6.4 (2018): 194-199.

APA Style Citation: G. Shukla, P. Srivastava, R. Kesarwani, H. Neyaz, (2018). Algorithmic Approach To Cloud Data Security. International Journal of Computer Sciences and Engineering, 6(4), 194-199.

BibTex Style Citation:
@article{Shukla_2018,
author = {G. Shukla, P. Srivastava, R. Kesarwani, H. Neyaz},
title = {Algorithmic Approach To Cloud Data Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {4},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {194-199},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1868},
doi = {https://doi.org/10.26438/ijcse/v6i4.194199}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.194199}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1868
TI - Algorithmic Approach To Cloud Data Security
T2 - International Journal of Computer Sciences and Engineering
AU - G. Shukla, P. Srivastava, R. Kesarwani, H. Neyaz
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 194-199
IS - 4
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
688 431 downloads 319 downloads
  
  
           

Abstract

Cloud Computing is taking popularity day by day in a various organization as it provides giant and scalable space for public and private use. Cloud computing is now widely used by many of the organization as a service. With the increase in the usage of the cloud, there also increases the concerns of cloud security. Somehow many organizations are hesitating to keep their data in the cloud due to security concerns. This paper understands various security issues related to cloud and resolves the data security issues, based on our proposed framework. Proposed framework is based on securing the various types of data like text, image and videos by applying Encryption Algorithms which reduces the various security issues and loopholes and thus making it more secure. It prevents the data from unauthorized access and also maintains the CIA (Confindentiality , Integrity, Availability). The paper proves to be providing the security in least time.

Key-Words / Index Term

Cloud Computing, Data Security, CSP(Cloud Service Provider), AES(Advanced Encryption Standard),Data theft, Breach level index,DoS,DDos,CIA(Confidentiality,Integrity,Availability)

References

[1] V. Chang , M. Ramachandran ,“Towards achieving data security with the cloud computing adoption framework”, IEEE Trans. Serv. Comput. 9 (1) (2016) pp. 138–151.

[2] K. Gai , M. Qiu , L. Chen , M. Liu, “Electronic health record error prevention approach” using ontology in big data”, 17th IEEE International Conference on High Performance Computing and Communications, New York, USA, 2015, pp. 752–757

[3] K. Gai , L. Qiu , H. Zhao , M. Qiu ,“Cost-aware multimedia data allocation for heterogeneous memory using genetic algorithm in cloud computing”, IEEE Trans. Cloud Computing. 1 (2016) pp. 99

[4] M. Rajasekhar Reddy, Akilandeswari R, S. Priyadarshini, B. Karthikeyan, E. Ponmani “ A Modified Cryptographic Approach For Securing Distributed Data Storage in Cloud Computing” 2017 International Conference on Networks & Advances in Computational Technologies (NetACT) |20-22 July 2017| Trivandrum

[5] Akanksha Bansal , Arun Agrawal “Providing Security ,Integrity and Authentication Using ECC Algorithm in cloud storage” 2017 International Conference on Computer Communication and Informatics (ICCCI -2017), Jan. 05 – 07, 2017, Coimbatore, INDIA

[6] Dr. P. Raviraj, Angeline Lydia, Dr. M.Y. Sanavullah “An Accurate Image Segmentation Using Region Splitting Technique” GESJ: Computer Science and Telecommunications 2011|No.2 (31) pp. 16-18 10 June 2010.

[7] Ajay Kulkarni, Saurabh Kulkarni, Ketki Haridas, Aniket More “Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study” International Journal of Computer Applications (0975 – 8887) Volume 65– No.1, pp. 3-5 March 2013.

[8] Jolly Shah and Dr. Vikas Saxena” Video Encryption: A Survey” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, pp. 5-8 March 2011

[9] Mohit Kumar, Akshat Aggarwal, Ankit Garg “A Review On Digital Image Encryption Techniques and Security Criteria” International Journal of Computer Applications (0975 – 8887) Volume 96– No.13, pp. 4-8 June 2014

[10] Mark Brinda, Michael Heric "The Changing Faces of the Cloud" Bain Global Technologies, Bain & Company, New York, pp. 5-12, 2017.

[11] Anju Bala, Dr. Aman Kumar Sharma “Split and Merge: A Region Based Image Segmentation” ,International Journal of Emerging Research in Management & Technology ISSN: 2278-9359 (Volume-6, Issue-8), August 2017

[12] Yunchuan Sun, Junsheng Zhang, Yongplng Xlong, Guangyu Zhu “Data Security and Privacy in Cloud Computing”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2014, Article ID 190903, 16 April 2016

[13] S. Arul Oli , Dr. L. Arockiam “Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage”, 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET) pp. 3-5

[14] Swapnil Rajesh Telrandhe, Deepak Kapgate “Authentication Model on Cloud Computing” International Journal of Computer Sciences and Engineering (IJCSE) Volume-2, Issue-10, pp. 33-37

[15] Sajjan R.S., Vijay Ghorpade, Vishvajit Dalimbkar “A Survey Paper on Data security in Cloud Computing” ” International Journal of Computer Sciences and Engineering (IJCSE) Volume-4, Special Issue-4

[16] Dr. Prerna Mahajan, Abhishek Sachdeva, “A Study of Encryption Algorithms AES, DES and RSA for Security” Global Journal Of Computer Science And Technology Network, Web & Security, Volume 13 Issue 15 Version 1.0 Year 2013, Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350, pp. 7-8