Migrated Encrypted Data in Cloud using Data Slicing Approach
Rajpreet Kaur1 , Paramjeet Singh2 , Shaveta Rani3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 286-290, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.286290
Online published on Jul 31, 2018
Copyright © Rajpreet Kaur, Paramjeet Singh, Shaveta Rani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Rajpreet Kaur, Paramjeet Singh, Shaveta Rani , “Migrated Encrypted Data in Cloud using Data Slicing Approach,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.286-290, 2018.
MLA Style Citation: Rajpreet Kaur, Paramjeet Singh, Shaveta Rani "Migrated Encrypted Data in Cloud using Data Slicing Approach." International Journal of Computer Sciences and Engineering 6.7 (2018): 286-290.
APA Style Citation: Rajpreet Kaur, Paramjeet Singh, Shaveta Rani , (2018). Migrated Encrypted Data in Cloud using Data Slicing Approach. International Journal of Computer Sciences and Engineering, 6(7), 286-290.
BibTex Style Citation:
@article{Kaur_2018,
author = {Rajpreet Kaur, Paramjeet Singh, Shaveta Rani },
title = {Migrated Encrypted Data in Cloud using Data Slicing Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {286-290},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2430},
doi = {https://doi.org/10.26438/ijcse/v6i7.286290}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.286290}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2430
TI - Migrated Encrypted Data in Cloud using Data Slicing Approach
T2 - International Journal of Computer Sciences and Engineering
AU - Rajpreet Kaur, Paramjeet Singh, Shaveta Rani
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 286-290
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
505 | 384 downloads | 240 downloads |
Abstract
Cloud computing is associate coming paradigm that gives tremendous benefits in economical aspects, resembling reduced time to promote, versatile computing capabilities, and limitless computing power. To use the complete potential of cloud computing, knowledge is transferred, processed and hold on by external cloud suppliers. However, data owners are very skeptical to place their data outside their own control sphere. Cloud computing is a new development of grid, parallel, and distributed computing with visualization techniques. It is changing the IT industry in a prominent way. Cloud computing has grown due to its advantages like storage capacity, resources pooling and multi-tenancy. In the proposed system, data to be send to the cloud is encrypted in two steps which are transposition cipher and by encrypting dynamic chunks in lesser time. Proposed system is also evaluated on various parameters like encryption time and data migration time. When compared it is seen that the performance of the proposed system is better than that of existing parameters in terms of evaluating parameters.
Key-Words / Index Term
Cloud Computing, Data Slicing, Data Encryption, Cloud Migration, Cloud Security
References
[1] G. Kumar, V. Laxmi, "An Approach for Securing Data on Cloud Using Data Slicing and Cryptography", World wide Journal of Multidisciplinary Research and Development, pp. 371-375, 2017.
[2] K. Ullah and M. N. A. Khan,"Security and Privacy Issues in Cloud Computing Environment: A Survey Paper", International Journal of Grid and Distributed Computing Vol.7, No.2, pp. 89-98 ,2014.
[3] R. P. Padhy, M. R. Patra,S. C. Satapathy, "Cloud Computing: Security Issues and Research Challenges", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) ,Vol. 1, No. 2, 2011.
[4] S. K. and R. H. Goudar, "Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey", International Journal of Future Computer and Communication, Vol. 1, No. 4,2012.
[5] Hasan Omar Al-Sakran,"ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT",International Journal of Network Security & Its Applications , Vol.7, No.1, 2015
[6] R. Sumithra & Sujni Paul,"A survey paper on cloud computing security and outsourcing data mining in cloud platform",International Journal of Knowledge Management & e-Learning, Vol. 3, No. 1, pp. 43-48 2011.
[7] M. Ahmed and M. A. Hossain, "CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD", International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, 2014.
[8] S. Pearson and A. Benameur,"Privacy, Security and Trust Issues Arising from Cloud Computing", 2nd IEEE International Conference on Cloud Computing Technology and Science
[9] S. Y. Koy, K. Jeony, R. Morales,"The HybrEx Model for Confidentiality and Privacy in Cloud Computing",2011
[10] A. Goel, S. Goel, "Security Issues in Cloud Computing", International Journal of Application or Innovation in Engineering & Management (IJAIEM),Vol. 1, Issue 4, 2012
[11] C. Patel, S. S. Chauhan, B. Patel, "A Data Security Framework for Mobile Cloud Computing", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 2,2015.
[12] S. Y. Hashemi, P. S. Hesarlo, "Security, Privacy and Trust Challenges in Cloud Computing and Solutions",I.J. Computer Network and Information Security, 8, 34-40,2014.
[13] R. K. Kalluri, Dr. C. V. Guru Rao, "Addressing the Security, Privacy and Trust Challenges of Cloud Computing",(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 6094-6097, 2014.
[14] A. A. Soofi, M. I. Khan, "A Review on Data Security in Cloud Computing", International Journal of Computer Applications (0975 – 8887) Volume 94 – No 5,2014
[15] Jayalakshmi S, H. kunder, "A Review Paper on RASP Data Perturbation for Confidential and Efficient Queries in the Cloud", INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING, Vol. 3, Special Issue 1, 2015
[16] Miss. R. Begum,Mr. R.N. Kumar and Mr. V. Kishore,"Data Confidentiality Scalability and Accountability (DCSA) in Cloud Computing", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 11, 2012.
[17] L. V. Singh, A. V. Bole, "Security Issues of Cloud Computing- A Survey", IJARCSMS, Volume 3, Issue 1, 2015.