Open Access   Article Go Back

Cloud Security Intensification by Client-side Data segregated and Encryption

Kretika Tiwari1 , Priyanka Sharma2 , Rahul Tiwari3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1672-1676, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.16721676

Online published on May 31, 2019

Copyright © Kretika Tiwari, Priyanka Sharma, Rahul Tiwari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kretika Tiwari, Priyanka Sharma, Rahul Tiwari, “Cloud Security Intensification by Client-side Data segregated and Encryption,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1672-1676, 2019.

MLA Style Citation: Kretika Tiwari, Priyanka Sharma, Rahul Tiwari "Cloud Security Intensification by Client-side Data segregated and Encryption." International Journal of Computer Sciences and Engineering 7.5 (2019): 1672-1676.

APA Style Citation: Kretika Tiwari, Priyanka Sharma, Rahul Tiwari, (2019). Cloud Security Intensification by Client-side Data segregated and Encryption. International Journal of Computer Sciences and Engineering, 7(5), 1672-1676.

BibTex Style Citation:
@article{Tiwari_2019,
author = {Kretika Tiwari, Priyanka Sharma, Rahul Tiwari},
title = {Cloud Security Intensification by Client-side Data segregated and Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1672-1676},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4469},
doi = {https://doi.org/10.26438/ijcse/v7i5.16721676}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.16721676}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4469
TI - Cloud Security Intensification by Client-side Data segregated and Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Kretika Tiwari, Priyanka Sharma, Rahul Tiwari
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1672-1676
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
346 198 downloads 152 downloads
  
  
           

Abstract

Cloud Computing is a technology that has seen a spurious growth recently and is being deployed for personal as well as business purposes. Cloud computing and analytics across the Internet provide greater pace to innovation and accelerate resources with increased flexibility. With this feature becoming increasingly integral to various services provided across the inter-connected digital world, it is imperative that its susceptibility be assessed and security made impenetrable to protect the sensitive information Cloud servers store. Cloud security has been vulnerable to threats and in several cases has led to Data Loss, Information Hacking and Denial of Services. These incidents have given rise to widespread concern regarding the data security that these Cloud Services employ. However, security models and security tools are being continually enhanced. This work aims to implement a Security Enhancement mechanism that gives the client-side greater control over data security and access.

Key-Words / Index Term

Cloud security, Diffie-Hellman Key Exchange, AES Encryption Standard, Multiple Blocks Cloud Storage

References

[1].V. Fusenig, A. Sharma 2012. Security architecture for cloud networking, in: 2012 International Conference on Computing, Networking and Communications (ICNC). Presented at the 2012 ICNC Conference.
[2].B.R. Kandukuri, V.R. Paturi, A. Rakshit, 2009. Cloud Security Issues, in: IEEE International Conference on Services Computing, SCC 2009.
[3].S. Ramgovind, M.M. Eloff, E. Smith, 2010. The management of security in Cloud computing, in: Information Security for South Africa (ISSA), 2010.
[4].Karun Handa, Uma Singh, 2015. Data Security in Cloud Computing using Encryption and Steganography. International Journal of Computer Science and Mobile Computing. IJCSMC, 2015.
[5].H. Tianfield, 2011. Cloud computing architectures, in: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC). Presented at the 2011 IEEE SMC Conference.
[6]. Op – ed : Encryption, not restriction, is the key to safe cloud computing. https: / / www. nextgov.com/cloud- computing/2012/10/oped-encryp-tion-not-restriction-key-
safe-cloudcomputing/58608
[7].“ Cloud Security and Privacy ” , Tim Mather, ShahedLatif and Subra Kumaraswamy. – O’Reilly Book.
[8].David Talbot. “ How Secure Is Cloud Computing?” Technology Review [Online].Available: http://www.technologyreview.com/computing/23951/ 2009
[9].Tania Gaur, Divya Sharma, 2016. A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing. I.J. Wireless and Microwave Technologies. IJWMT 2016.

[10].Elminaam, DiaaSalama Abdul et al. "Performance Evaluation of Symmetric Encryption Algorithms." IJCSNS International Journal of Computer Science and Network Security 8.12. 2008
[11]. “Heuristics in Physical Design Partitioning “, Bhargab Sinha, Naushad Manzoor Laskar, Rahul Sen, ICIIECS 2015
[12]. “Security Aware Partitioning for efficient file system search”, Aleatha Parker Wood, Christina Strong, Ethan L. Miller.