Enhancing Portability and Confidentiality of Data Migration Among Inter Clouds
Gagandeep Kaur1 , Kiranbir Kaur2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-8 , Page no. 310-315, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.310315
Online published on Aug 31, 2018
Copyright © Gagandeep Kaur, Kiranbir Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Gagandeep Kaur, Kiranbir Kaur, “Enhancing Portability and Confidentiality of Data Migration Among Inter Clouds,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.310-315, 2018.
MLA Style Citation: Gagandeep Kaur, Kiranbir Kaur "Enhancing Portability and Confidentiality of Data Migration Among Inter Clouds." International Journal of Computer Sciences and Engineering 6.8 (2018): 310-315.
APA Style Citation: Gagandeep Kaur, Kiranbir Kaur, (2018). Enhancing Portability and Confidentiality of Data Migration Among Inter Clouds. International Journal of Computer Sciences and Engineering, 6(8), 310-315.
BibTex Style Citation:
@article{Kaur_2018,
author = {Gagandeep Kaur, Kiranbir Kaur},
title = {Enhancing Portability and Confidentiality of Data Migration Among Inter Clouds},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {310-315},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2694},
doi = {https://doi.org/10.26438/ijcse/v6i8.310315}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.310315}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2694
TI - Enhancing Portability and Confidentiality of Data Migration Among Inter Clouds
T2 - International Journal of Computer Sciences and Engineering
AU - Gagandeep Kaur, Kiranbir Kaur
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 310-315
IS - 8
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
553 | 272 downloads | 278 downloads |
Abstract
Transferring information over the network is widely used fast and reliable source for communication. Users with wide fidelity use this mechanism for transferring and accessing information. Portability and interoperability within the cloud system through offline and online mediums are continuously desirable but the problem of security arises during the transmission process. Security and reliability is the key issue during the transfer process which is considered in this research. Information security is provided using the public and private key RSA cryptography. The experiment is implied not only at offline data but also at online data such as Google Docs. Redundancy handling mechanism is used to ensure that space at data storage provider is least used since cost in DSP is accompanied by the amount of storage used. Overall space requirement in case of heavy files is reduced and security of online information accessing is enhanced by the use of RSA cryptography with redundancy handling mechanism.
Key-Words / Index Term
Interoperability, Portability, Security, reliability, RSA, Redundancy, Cost
References
[1] F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.
[2] X. Wu, R. Jiang, and B. Bhargava, “On the Security of Data Access Control for Multiauthority Cloud Storage Systems,” pp. 1–14, 2015.
[3] J. Aikat et al., “Rethinking Security in the Era of Cloud Computing,” no. June, 2017.
[4] K. Hwang, X. Bai, Y. Shi, M. Li, W.-G. Chen, and Y. Wu, “Cloud Performance Modeling with Benchmark Evaluation of Elastic Scaling Strategies,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 130–143, Jan. 2016.
[5] T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 367–380, Feb. 2016.
[6] M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, p. 50, 2010.
[7] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” Proc. - 10th IEEE Int. Conf. High Perform. Comput. Commun. HPCC 2008, pp. 5–13, 2008.
[8] S. J. Nirmala, N. Tajunnisha, and S. M. S. Bhanu, “Service provisioning of flexible advance reservation leases in IaaS clouds,” vol. 3, no. 3, pp. 154–162, 2016.
[9] M. Marwan, A. Kartit, and H. Ouahmane, “Secure Cloud-Based Medical Image Storage using Secret Share Scheme,” 2016.
[10] D. V. Dimitrov, “Medical internet of things and big data in healthcare,” Healthc. Inform. Res., vol. 22, no. 3, pp. 156–163, 2016.
[11] J. Li, J. Li, X. Chen, C. Jia, W. Lou, and S. Member, “Identity-based Encryption with Outsourced Revocation in Cloud Computing,” pp. 1–12, 2013.
[12] S. Seo, M. Nabeel, and X. Ding, “An Ef fi cient Certi fi cateless Encryption for Secure Data Sharing in Public Clouds,” pp. 1–14, 2013.
[13] S. Wang, J. Zhou, J. K. Liu, J. Yu, and J. Chen, “An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing,” vol. 6013, no. c, pp. 1–13, 2016.
[14] D. Xu, C. A. I. Fu, G. Li, and D. Zou, “Virtualization of the Encryption Card for Trust Access in Cloud Computing,” vol. 5, 2017.
[15] A. Alabdulatif, H. Kumarage, I. Khalil, M. Atiquzzaman, and X. Yi, “Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure,” IET Wirel. Sens. Syst., vol. 7, no. 6, pp. 182–190, 2017.
[16] J. Li, X. Lin, Y. Zhang, and J. Han, “KSF-OABE : Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage,” vol. 1374, no. c, pp. 1–12, 2016.
[17] L. Jiang, D. Guo, and S. Member, “Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage,” vol. 5, 2017.
[18] C. Liu, S. Member, L. Zhu, J. Chen, and S. Member, “Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud,” vol. 3782, no. c, pp. 1–11, 2017.
[19] C. Song, Y. Park, J. Gao, S. K. Nanduri, and W. Zegers, “Favored Encryption Techniques for Cloud Storage,” pp. 267–274, 2015.
[20] N. Veeraragavan, “Enhanced Encryption Algorithm ( EEA ) for Protecting Users ’ Credentials in Public Cloud.”
[21] P. Xu, S. He, W. Wang, W. Susilo, and H. Jin, “Lightweight Searchable Public-key Encryption for Cloud-assisted Wireless Sensor Networks,” IEEE Trans. Ind. Informatics, vol. XX, no. XX, pp. 1–12, 2017.
[22] K. L. Tsai et al., “Cloud encryption using distributed environmental keys,” Proc. - 2016 10th Int. Conf. Innov. Mob. Internet Serv. Ubiquitous Comput. IMIS 2016, pp. 476–481, 2016.
[23] A. El-yahyaoui, “A verifiable fully homomorphic encryption scheme to secure big data in cloud computing,” 2017.
[24] G. Thomas, “Cloud computing security using encryption technique,” pp. 1–7.