Open Access   Article Go Back

Security Approach for Data Storage and Retrival in The Cloud

Somnath Basak1 , Somnath Dey2 , Mrinmay Deb3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 106-110, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.106110

Online published on Aug 31, 2018

Copyright © Somnath Basak, Somnath Dey, Mrinmay Deb . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Somnath Basak, Somnath Dey, Mrinmay Deb, “Security Approach for Data Storage and Retrival in The Cloud,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.106-110, 2018.

MLA Style Citation: Somnath Basak, Somnath Dey, Mrinmay Deb "Security Approach for Data Storage and Retrival in The Cloud." International Journal of Computer Sciences and Engineering 6.8 (2018): 106-110.

APA Style Citation: Somnath Basak, Somnath Dey, Mrinmay Deb, (2018). Security Approach for Data Storage and Retrival in The Cloud. International Journal of Computer Sciences and Engineering, 6(8), 106-110.

BibTex Style Citation:
@article{Basak_2018,
author = {Somnath Basak, Somnath Dey, Mrinmay Deb},
title = {Security Approach for Data Storage and Retrival in The Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {106-110},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2663},
doi = {https://doi.org/10.26438/ijcse/v6i8.106110}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.106110}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2663
TI - Security Approach for Data Storage and Retrival in The Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Somnath Basak, Somnath Dey, Mrinmay Deb
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 106-110
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
783 489 downloads 316 downloads
  
  
           

Abstract

Since the beginning of courtesy, man has always been motivated by the need to make advancement and better the existing technologies. This has led to remarkable development and progress which has been a launching pad for further evoluation of all the momemtous advances made by society from the beginning till date. Cloud computing is the concept of using outlying services through a network using various resources. It is basically meant to give maximum with the minimum resources i.e. the user end is having the minimum hardware requirement but is using the maximum capability of computing. This is possible only through this technology which requires and utilizes its resources in the best way. But this advantage comes at a cost. Firstly, the data is uploaded insecurely which has a high risk of being hacked by some malicious people. Secondly, the data saved at outlying servers is under the surveillance of unauthorized people who can do anything with our data and Information. So, these data security risks are causing a barrier in the development of the area of cloud computing infrastructure. In this paper we have discussed about the various techniques by which we can enhance the cloud service in relation to security and data privacy and also designed a new effective cloud data security infrastructure.

Key-Words / Index Term

Cloud Computing, OTP, Data Security, Data Privacy

References

[1] V. Paranjape, V. Pandey, “An approach towards security in private cloud using otp”, International Journal of Emerging Technology and Advanced Engineering (IJETAE), Vol.3, Issue.3, pp.683-687, 2013.
[2] S. Arora, P. Luthra “Security Storage Model of Data in Cloud”, International Journal of Current Engineering and Scientific Research (IJCESR), Vol.2, Issue.6, pp.99-105, 2015.
[3] H. B. Patel, D. R. Patel, B. Borisaniya, A. Patel, “Data storage security model for cloud computing”, Advances in Communication, Network, and Computing, CNC 2012, pp. 37–45, 2012.
[4] S. Kamara, K. Lauter, “Cryptographic cloud storage,” in Financial Cryptography and Data Security. Springer, pp. 136–149, 2010.
[5] G. Choudhury, J. Abudin, “Modified secure two-way authentication system in cloud computing using encrypted one-time password.” International Journal of Computer Science & Information Technologies, IJCSIT, Vol.5, no. 3, 2014.
[6] S. K. Sood, “A combined approach to ensure data security in cloud computing”, Journal of Network and Computer Applications, Vol.35, no.6, pp.1831–1838, 2012.
[7] R. Manjusha, R. Ramachandran, “Comparative study of attribute-based encryption techniques in cloud computing”, in Embedded Systems (ICES), International Conference on. IEEE, pp.116–120, 2014.
[8] V. Spoorthy, M. Mamatha, B. Santhosh Kumar, "A survey on data storage and security in cloud computing", International Journal of
Computer Science and Mobile Computing, IJCSMC, vol.3, Issue.6, pp. 306-316, 2014.
[9] N. Gowtham Kumar, K. Praveen Kumar Rao, “Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage using Digital Signatures”, International Journal of Computer Science and Information Technologies, IJCSIT, Vol.5, pp. 8074-8078, 2014.
[10] E. M. Mohamed, H. S. Abdelkader, S. El-Etriby, “Data Security Model for Cloud Computing”, Journal of Communication and Computer, Vol.10, pp.1047-1062, 2013.