Open Access   Article Go Back

Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey

Rakesh Prasad Sarang1

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 813-826, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.813826

Online published on Oct 31, 2018

Copyright © Rakesh Prasad Sarang . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rakesh Prasad Sarang , “Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.813-826, 2018.

MLA Style Citation: Rakesh Prasad Sarang "Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey." International Journal of Computer Sciences and Engineering 6.10 (2018): 813-826.

APA Style Citation: Rakesh Prasad Sarang , (2018). Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey. International Journal of Computer Sciences and Engineering, 6(10), 813-826.

BibTex Style Citation:
@article{Sarang_2018,
author = {Rakesh Prasad Sarang },
title = {Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {813-826},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3106},
doi = {https://doi.org/10.26438/ijcse/v6i10.813826}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.813826}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3106
TI - Cloud Computing Technologies for Privacy Data and Digital Security Authentication: A Literature Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Rakesh Prasad Sarang
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 813-826
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
677 353 downloads 323 downloads
  
  
           

Abstract

Cloud computing is a model for enabling ubiquitous convenient, where the resources of a data center are shared using virtualization technology. Cloud computing is one of the dynamic provisioning technology. Cloud computing technology can be implemented in a wide variety of architectures under different services and deployment models. Privacy to the data stored in cloud server is a major challenging operation in cloud computing. The objective of this paper is to explore different methods for efficiently growing latest digital techniques. The main aim of this paper is to design and propose strong security system to the data stored in the cloud system. This paper presents a literature review we studied the background work of carried-out by the various approaches about the uses of cloud technology. We have proposed framework and different methods which provides, identification of high protection. The literature review presents previous studies related to the objectives of the present study. Further various features that make the proposed framework more suitable for analysis and evaluation of cloud computing. The privacy cloud algorithms are categorized into subgroups according to the high level security concerns in the cloud computing.

Key-Words / Index Term

Cloud Computing, Privacy and Protection Technique, Digital Authentication for Data Security, Algorithms for Privacy

References

[1] Ranchal et al., “Protection of Identity Information in Cloud Computing without Trusted Third Party”, 2010 29th IEEE International Symposium on Reliable Distributed Systems, pp. 368-372, 2010.
[2] Z. Xin et al., “Research on Cloud Computing Data Security Model Based on Multi-dimension”,International Symposium on Information Technology in Medicine and Education, IEEE, pp. 897-900, 2012.
[3] Rao, Srinivasa and V Nageswara Rao, “Cloud Computing: an Overview”, Computing, pp71-76, 2009.
[4] Mell, Peter and Timothy Grance, “The NIST Definition of Cloud Computing”, National Institute of Standards and Technology, 2011.
[5] Mitra, A., & Kundu, A., “Cost optimized set of Primes Generation with Cellular Automata for Stress Testing in Distributed Computing”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) Procedia Technology, 10, Elsevier, pp 365-372, 2013.
[6] A.S. Tanenbaum and M. Van Steen., “Distributed systems: principles and paradigm”, prentice Hall PTR, Upper Saddle River, NJ, USA, 2001.
[7] C.S.R.Prabhu, “Grid and Cluster Computing”, 2012.
[8] Yeo, C. S., Buyya, R., Pourreza, H., Eskicioglu, R., Graham, P., & Sommers, F. “Cluster Computing: High-Performance, High-Availability, and High-Throughput Processing on a Network of Computer. Communication”, 1-24.
[9] R, Buyya, “High-Performance Cluster Computing: Architecture and system”, prentice Hall PTR, NJ, 1999.
[10] William Maples, “ High Performance Computing, Grid Computing”
[11] Zhang, M. A. Z. Y. D. P., “Adoptability of grid computing technology in power systems analysis, operations and control”, Engineering and Technology, 2009.
[12] Yeo, C. S., Buyya, R., Assunção, M. D. D., Yu, J., Sulistio, A., Venugopal, S., et al.,”Utility Computing on Global Grids Benefits of Utility Computing”. Group, 1-26.
[13] R. Buyya et al., “ Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities”,2008.
[14] A. Jansen,” Cloud Hooks: Security and Privacy Issues in Cloud Computing”, Proceedings of the 44th Hawaii International Conference on System Sciences, pp 1-10, 2011.
[15] N. Provos, “The Ghost In The Browser Analysis of Web-based Malware”, USENIX Association, 2007.
[16] D.Tao, “ Cloud Platform Based Automated Security Testing System for Mobile Internet”, Tsinghua Science and Technology, Vol. 20, Number 6,pp. 537-544, 2015.
[17] Hebiya et al., “Secure Data Storage Framework using Anti-XSS in cloud”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.4, Issue 11, pp. 11429- 11436, 2015.
[18] Kaushik et al., “Keyless User Defined Optimal Security Encryption”, International Journal of Computer and Electrical Engineering, Vol.4, No.2, pp. 99-103,2012.
[19] Gholami et al., “Big Data Security and Privacy Issues in the Cloud”, International Journal of Network Security & Its Applications, Vol.8, No.1, pp.59-79, 2016.
[20] Tang et al., “Multi-Tenancy Authorization Models for Collaborative Cloud Services”, International Conference on Collaboration Technologies and Systems, IEEE Xplore: pp.132-138, 2013.
[21] Goyal et al., “Veracity Aware Defense Algorithm (VADA) for Cloud computing environment”, pp. 57-68.
[22] K. Malviya et al., “On Security Issues in Web Applications through Cross Site Scripting (XSS)”, 20th Asia-Pacific Software Engineering Conference, pp.583-588,2013.
[23] Mircea, “Addressing Data Security in the Cloud”,International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol.6, No.6,pp.798-805, 2012.
[24] K. Dhanabakiyam,V. Divya,“Enhanced Protection Over Data Streams under Multiple Keys in Cloud”, International Journal of Advance Research, Ideas and Innovations in Technology, Vol. 4, Issue 2,pp.439-442,2018.
[25] Vijai et al., “An Efficient Framework Security Model of Sharing Data for Privacy Protection and Performance-Based Outsource Data Sharing on Cloud”,International Journal of Advance Research, Ideas and Innovations in Technology, Vol.4, Issue 2,pp.297-304,2018.
[26] Viswanadham et al., “Security Issues in Cloud Computing and Associated Mitigation Techniques”,Advances in Information Science and Computer Engineering,pp. 528-540.
[27] D.Bein, “The Impact of Cloud Computing on Web 2.0”, Economy Informatics, vol. 9, no.1,pp.9-12, 2009.
[28] J. Kumar et al., “Analysis of Security Vulnerabilities for web Based
Application”, Fourth International Conference on Advances in Recent Technologies in Communication and Computing, pp.233-236,2012.
[29] H.Albaroodi et al.,“A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift)”, Journal of Computer Science, 11 (3), 590-597, 2015.
[30] N.Nagar and U.Suman,“Architectural Comparison and Implementation of Cloud Tools and Technologies”,International Journal of Future Computer and Communication, Vol. 3, No. 3,pp.153-160, 2014.
[31] T. Sivasakthi and N. Prabakaran, “Applying Digital Signature with Encryption Algorithm of User Authentication for Data Security in Cloud Computing”, International Journal of Innovative Research in Computer and Communication Engineering,Vol. 2, Issue 2, pp. 3102-3107, 2014.
[32] S.Singh et al.,“Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud”, International Journal of Computer Applications, Vol. 136 – No.12,pp.12-16, 2016.
[33] K. Sarita, J. Thakur,“Data Centric Security Algorithms In Cloud Computing - A Review”, International Journal for Research in Applied Science & Engineering Technology, Vol.5 Issue X,pp.1155-1160, 2017.
[34] M.Panda, “Performance Analysis of Encryption Algorithms for Security”, International conference on Signal Processing, Communication, Power and Embedded System,2016.
[35] Chuang et al., “An Effective Privacy Protection Scheme for Cloud Computing”, pp.260-265,ICACT,2011.
[36] N. Nagar and U. Suman,“Two Factor Authentication using M-pin Server for Secure Cloud Computing Environment”, International Journal of Cloud Applications and Computing, 4(4), pp. 42-54,2014.
[37] V. Kapoor, “A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security”, Int. J. Sci. Res. In Network Security and Communication, Vol.1 Issue 2,pp.39-46, 2013.
[38] Prakash et al., “Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System”, International Journal of Engineering and Computer Science, Vol.3 Issue 4, pp. 5215-5223, 2014.
[39] Priyanka et al., “A New Approach for Design of Model Matching Controllers for Time Delay Systems by Using GA Technique”,Journal of Engineering Research and Applications, Vol. 5, Issue 1, pp.89-99 ,2015.
[40] K. Dasgupta et al., “A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing”,International Conference on Computational Intelligence: Modeling Techniques and Applications, pp. 340 – 347, 2013.
[41] Changhee H., J. Hur,“Efficient and privacy-preserving biometric identification in cloud”, The Korean Institute of Communications Information Sciences, Publishing Services Elsevier, pp.135-139,2016.
[42] John et al.,“Cryptanalytic Attacks on Pseudorandom Number Generators”, pp. 1-22.
[43] N. Saravanan et al., “An Implementation of RSA Algorithm in Google Cloud using Cloud SQL”,Research Journal of Applied Sciences, Engineering and Technology 4(19), pp.3574-3579, 2012.
[44] G.Singh, supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”,International Journal of Computer Application, Vol. 67– No.19,pp.33-38, 2013.
[45] Karthik S. et al.,“Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System”,International Journal of Scientific Engineering and Research,Vol. 2 Issue 11, pp.24-31, 2014.
[46] P.Mahajan et al., “A Study of Encryption Algorithms AES, DES and RSA for Security”, Global Journal of Computer Science and Technology Network, Web & Security,Vol.13 Issue 15 Version 1.0, pp.15-22, 2013.
[47] R. Kaur ,S. Kinger, “Analysis of Security Algorithms in Cloud Computing”,International Journal of Application or Innovation in Engineering & Management, Vol.3, Issue 3,pp. 171-176, 2014.
[48] Hebiya et al., “Secure Data Storage Framework using Anti-XSS in cloud”,International Journal of Innovative Research in Science,Engineering and Technology, Vol.4, Issue 11, pp.11429- 11436, 2015.
[49] R. K. Seth, et al., “TBDS- A New Data Security Algorithm in Cloud Computing”, International Journal of Computer Science and Information Technologies, Vol. 5 (3) , pp., 2703-2706, 2014.
[50] D.Rao et al., “A Design of Cloud Privacy Manager Algorithm”, International Journal of Computer Science and Network Security, Vol.12, No.7,pp.36-41, 2012.
[51] Buyya et al., “Cloud Computing Principles and Paradigms”.
[52] Mihai et al., “Cloud Security Is Not (Just) Virtualization Security”,
CCSW-09, 2009.
[53] A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, Proceedings of the 44th Hawaii International Conference on System Sciences, pp 1-10, 2011.
[54] Dale L, “Virtualization Technologies in Information Systems Education”, Journal of Information Systems Education, Vol.20 (3), PP.339-348.
[55] M. A. Vouk,“Cloud Computing – Issues, Research and Implementations”, Journal of Computing and Information Technology - CIT 16, 4, pp.235–246, 2012.
[56] M.Komu et al., “Secure Networking for Virtual Machines in the Cloud”, IEEE International Conference on Cluster Computing Workshops,pp. 88-96, 2012.
[57] B. Furht and A. Escalante, “Handbook of cloud computing”, Springer New York Dordrecht Heidelberg London, ISBN 978-1-4419-6523-3, 2010.