Open Access   Article Go Back

Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment

Rachna Jain1 , Sushila Madan2 , Bindu Garg3

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 130-135, Jan-2015

Online published on Jan 31, 2015

Copyright © Rachna Jain, Sushila Madan , Bindu Garg . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rachna Jain, Sushila Madan , Bindu Garg, “Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.130-135, 2015.

MLA Style Citation: Rachna Jain, Sushila Madan , Bindu Garg "Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment." International Journal of Computer Sciences and Engineering 3.1 (2015): 130-135.

APA Style Citation: Rachna Jain, Sushila Madan , Bindu Garg, (2015). Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment. International Journal of Computer Sciences and Engineering, 3(1), 130-135.

BibTex Style Citation:
@article{Jain_2015,
author = {Rachna Jain, Sushila Madan , Bindu Garg},
title = {Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {130-135},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=377},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=377
TI - Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Rachna Jain, Sushila Madan , Bindu Garg
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 130-135
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2636 2448 downloads 2562 downloads
  
  
           

Abstract

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. The use of cloud computing has been increased rapidly in various organizations as it provides multiple benefits in terms of low cost and accessibility of data. There are different types of issues have been observed in cloud computing environment that need to be addressed. In the past, International Data Corporation (IDC) conducted a survey of 263 IT executives to gauge their opinion about the usage of IT cloud services in companies. As a result, Security was ranked first and observed utmost issue of cloud computing. So nowadays, protection of data in cloud is a big deal. Organizations mislay control over the data as soon as data moves to the cloud. Thus, protection needed to secure data is directly proportional to the value of the data.The first level of security where cryptography can help cloud computing is secure storage .There are already some cloud providers that have started providing secure storage services but offering different levels of protection.The major handicap of secure storage is that we cannot outsource the processing of this data without decrypting it before or without revealing the keys used for encryption. In this paper, various techniques to secure data access in cloud environment has been analyzed and during analysis it is observed that security need to be addressed for securing transaction in such a way that transaction should be encrypted and not be decrypted during access. Moreover, access should be provided to the users as per their access rights. Security can be enhanced by use of multi cloud as single cloud that become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud.

Key-Words / Index Term

Cloud Computing,Single Cloud,Multi Cloud,Homomorphic Encryption,HELIB

References

[1] Introduction to cloud computing architecture [online]. Sun Microsystems USA: Santa Clara:Sun Microsystems 2009.URL:http://http://www.scribd.com/doc/17274860/Introduction-to-Cloud-Computing-Architecture, Accessed 08 June 2010.
[2] Peter Mell, and Tim Grance, Draft NIST Working Definition of Cloud Computing, 2009: from http://csrc.nist.gov/groups/SNS/cloud-computing/
[3] Michael Armbrust et al. Above the Clouds: A Berkeley View of Cloud Computing Technical report EECS-2009-28,UCBerkeley,http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html, Feb 2009.
[4] Amazon Elastic Computing Cloud, aws.amazon.com/ec2
[5] Cloud Hosting, CLoud Computing and Hybrid Infrastructure from GoGrid, http://www.gogrid.com
[6] FlexiScale Cloud Comp and Hosting, www.flexiscale.com
[7] Cloud computing [online].Cloud computing Asia: 2010.URL:http://www.cloudcomputinglive.com/asia/platform-as-a-service.html, Accessed December 08,2010.
[8] Google App Engine, URL http://code.google.com/appengine
[9] Windows Azure, www.microsoft.com/azure
[10] Salesforce CRM, http://www.salesforce.com/platform
[11] What is Saas and What are its advantages?[online]. Metaquote Software corp:2008-2011.URL:http://www.teamwox.com/en/teamwox/tutorials/71,Accessed September 15, 2010.
[12] Dedicated Server, Managed Hosting, Web Hosting by Rackspace Hosting, http://www.rackspace.com
[13] SAP Business ByDesign, www.sap.com/sme/solutions/
[14] Laying the ground work for Public cloud and Private Cloud [online]. Dell inc: 15 June2010.URL: http://whitepapers.businessweek.com/data/memberRegister.do,Accessed July 06,2010.
[15] CloudComputing UseCases White Paper [online]. SA(shared alike): July 2,2010. URL: http://www.scribd.com/doc/18172802/Cloud-Computing-Use-Cases-Whitepaper, Accessed July 21,2010.
[16] A community approach to cloud computing [online]. Orange Business Services:July-August 2010.URL:http://www.orangebusiness.com/en/mnc2/footer/news/enterprise_briefing/summer2010/cloud-computing.jsp ,Accessed July 23, 2010
[17] Deloitte. Executive Forum - Cloud Computing: risks, mitigation strategies, and the role of Internal Audit. Available: http://www.deloitte.com
[18] C. Pettey and B. Tudor. Gartner says worldwide cloud services market to surpass $68 billion in 2010 Available: http://www.gartner.com/it/page.jsp?id=1389313
[19] Cloud Computing Services - New Market Report Published.Available:http://www.companiesandmarkets.com/r.ashx?id=41AETZYHJ289173&prk=ecb8413c602cb89051067456b636c7b9 , Press Office. (2010, 31 August 2010).
[20] Xing Zhou, Xiaofei Tang, Research and Implementation of RSA Algorithm for Encryption and Decryption, Department of Computer Science and Technology Harbin, china,2011.
[21] Eman M.Mohamed, Hatem S. Abdelkader, Sherif EI-Etriby ―Enhanced Data Security Model for Cloud Computing‖, The 8th International Conference on Informatics and Systems (INFOS2012) - 14-16 May Cloud and Mobile Computing Track.
[22] Dubey, Ashutosh Kumar, M. Namdev, and Shiv Shakti Shrivastava. "Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment",Software Engineering (CONSEG), 2012 CSI Sixth International Conference on IEEE, 2012.
[23] Prashant Rewagad, yogita pawar,” Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, CSNT '13 Proceedings of the 2013 International Conference on Communication Systems and Network Technologies IEEE computer society Washington,DC, Page No. ( 437-439 ),USA2013.
[24] Alowolodu, Ogundele, “Elliptic Curve Cryptography for Securing Cloud Computing Applications”, International Journal of Computer Applications, Vol.- 66, No. -23, March 2013.
[25] Radhika G, K.V.V. Satyanarayana, Tejaswi A,” Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms”, International Journal of Computer Trends and Technology- volume-4,Issue-3,2013.
[26] Hongwei Li1, Yuanshun Dai1, 2, Bo Yang1,” Identity-Based Cryptography for Cloud Security” http://eprint.iacr.org/2011/169.pdf.
[27] R. Rivest, L. Adleman and M. Dertouzos, “On Data Banks And Privacy Homomorphisms”, Foundations of Secure Computation, Page No. (169–180),1978.
[28] C. Gentry, “A Fully Homomorphic Encryption Scheme”, PhD Thesis, Stanford University, http://crypto.stanford.edu/craig, 2009.
[29] C. Gentry. , “ Fully homomorphic encryption using ideallattices”, In Proc. of STOC, ACM, Page No(169-178)., 2009
[30] M. van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan, “FullyHomomorphic Encryption Over the Integers”, Advances in Cryptology, Eurocrypt 2010, Lecture Notes in Computer Science, Page No. (24–43), 2010.
[31] Z. Brakerski, C. Gentry and V. Vaikuntanathan, “Fully Homomorphic Encryption without Bootstrapping”, Innovations in Theoretical Computer Science Conference, Page No. (309–325), 2012.
[32] C. Gentry, S. Halevi and N. Smart, “Homomorphic Evaluation Of The AES Circuit”, Advances in Cryptology, Crypto 2012, Lecture Notes in Computer Science, Page No.( 850–867), 2012.
[33] N. Smart and F. Vercauteren, “Fully Homomorphic SIMD Operations”, Designs, Codes and Cryptography, 2012.
[34] C. Gentry, “Computing Arbitrary Functions Of Encrypted Data”, Communications Of The ACM, Page No.( 97–105), 2010.
[35] C. Gentry and S. Halevi, “Implementing Gentry’s Fully-Homomorphic Encryption Scheme”, Advances in Cryptology, EuroCrypt 2011, Lecture Notes in Computer Science, Page No.( 129–148), 2011.
[36] M. Naehrig, K. Lauter and V. Vaikuntanathan, “Can Homomorphic Encryption Be Practical? ”, ACM Workshop on Cloud Computing Security Workshop, Page No.( 113–124), 2011.
[37] Smart, N. P., & Vercauteren, F. ,” Fully homomorphic encryption with relatively small key and ciphertext sizes In Public Key Cryptography–PKC”, Springer Berlin Heidelberg, Page No(420-443),2010.
[38] Cramer, R., Damgård, I., & Nielsen, J. B. ,”Multiparty computation from threshold homomorphic encryption”, Springer Berlin Heidelberg ,Page No( 280-300),2001.