Open Access   Article Go Back

Data Security in Cloud Computing: A Survey

Shaziya Banu1 , Gopal K Shyam2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 245-251, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.245251

Online published on May 15, 2019

Copyright © Shaziya Banu, Gopal K Shyam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shaziya Banu, Gopal K Shyam, “Data Security in Cloud Computing: A Survey,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.245-251, 2019.

MLA Style Citation: Shaziya Banu, Gopal K Shyam "Data Security in Cloud Computing: A Survey." International Journal of Computer Sciences and Engineering 07.14 (2019): 245-251.

APA Style Citation: Shaziya Banu, Gopal K Shyam, (2019). Data Security in Cloud Computing: A Survey. International Journal of Computer Sciences and Engineering, 07(14), 245-251.

BibTex Style Citation:
@article{Banu_2019,
author = {Shaziya Banu, Gopal K Shyam},
title = {Data Security in Cloud Computing: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {245-251},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1130},
doi = {https://doi.org/10.26438/ijcse/v7i14.245251}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.245251}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1130
TI - Data Security in Cloud Computing: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Shaziya Banu, Gopal K Shyam
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 245-251
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud computing is increasing its importance due to the services and IT resources provided by the cloud service providers. There are numerous advantages in cloud computing like highly scalable, low cost and high availability. But the data security and privacy is a major concern in cloud computing. Sharing the resources and storing the data in cloud is the major application in cloud computing. To protect the data in cloud, against unauthorized access, modification and denial of service etc. The biggest challenge in cloud is storing and sharing the sensitive data. In this paper, we have discussed symmetric algorithms, asymmetric algorithms, hash algorithms for security purpose and comparison of algorithms for securing data in different deployment models of cloud. In symmetric we have discussed AES, Fully Homomorphic Encryption, Blowfish, GLEnc, and asymmetric algorithms are DIFFE-HELLMAN, QKD-NAE Technique, RSA Cryptosystem, Identity Based Encryption. In hash few of the algorithms that has been discussed in this paper are MD5, SHA.

Key-Words / Index Term

Cloud Computing, Data Security, Symmetric Encryption, Asymmetric Encryption, Hash function

References

Yara AlHumaidan, Lama AlAjmi, Moudhi Aljamea, Maqsood Mahmud, ”Analysis of cloud computing security in perspective of saudi arabia”, published in IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom), 2018.
[2] T.Ramaporkalai, ”Comparitive study of security algorithms in cloud computing”, pubished in International Journal of Computer Engineering and Applications, volume XII, Issue I, pp.124-121, Jan 2018.
[3] Bih-Hwang Lee, Ervin Kusuma Dewi, Muhammad Farid Wajdi, ”Data Security in Cloud Computing Using AES Under HEROKU Cloud”, published in the 27th wireless and optical communications conference (WOCC2018), 2018.
[4] Ahmed EL-Yahyaoui, Mohamed Dafir Ech-Chrif ELKettani, ”Data Privacy in Cloud Computing”, published in 4th International Conference on Computer and Technology Applications, pp.25-28, 2018.
[5] M. Thangapandiyan, P. M. Rubesh Anand and K. Sakthidasan @ Sankaran, ”Enhanced Cloud Security Implementation using Modified ECC Algorithm”, published in International Conference on Communication and Signal Processing, pp.1019-1022, India, April 3-5, 2018.
[6] M. Thangapandiyan, P. M. Rubesh Anand, and K. Sakthidasan @ Sankaran, ”Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security”, published in International Conference on Communication and Signal Processing, pp.1030-1035, India, April 35, 2018.
[7] Remi Sahl, Paco Dupont, Christophe Messager, Marc Honnorat, Tran Vu La, ”High-resolution ocean winds: Hybrid-cloud infrastructure for satellite imagery processing”, published in IEEE 11th International Conference on Cloud Computing, pp.883-886, 2018.
[8] Abhishek Mahalle, Jianming Yong Xiaohui, Tao Jun Shen, ”Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure”, IEEE 22nd International Conference on Computer Supported Cooperative Work in Design, 2018.
[9] Mennan Selimi, Felix Freitag, Roger Pueyo Centelles, Agust Moll, ”Distributed Storage and Service Discovery for Heterogeneous Community Network Clouds”, IEEE/ACM 7th International Conference on Utility and Cloud Computing, 2014.
[10] Sang-Hyun Lee, Kyung-Wook Shin, ”An Efficient Implementation of SHA processor Including Three Hash Algorithms(SHA-512, SHA512/224, SHA-512/256)”, 2018.
[11] Lalu P, George, Dr.D.I.George Amalarethinam Bursar, Dr.Anjana S.Chandran, ”GLEnc Algorithm to Secure Data in Public Cloud Environment”, 2018.
[12] Rishav Chatterjee, Sharmistha Roy, ”Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud”, 2017.
[13] Celia Li, Cungang Yang, ”A Novice Group Sharing Method for Public Cloud”, published in IEEE 11th International Conference on Cloud Computing, pp.966-969, 2018.
[14] Changhee Hahn,Hyunsoo Kwon, Junbeom Hur, ”Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Temper-Resistance in Pubic Cloud Storage”, published in IEEE 11th International Conference on Cloud Computing, pp.920-923, 2018.
[15] Deepanshi Nanda, Sonia Sharma, ”Security in Cloud Computing using Cryptographic Techniques”, published in International Journal of Computer science and technology, Vol.8, Issue 2, pp.66-69, April - June 2017.
[16] Gary c. Kersler, ”An Overview of Cryptography”, https://www.garykersler.net/library/crypto.html, 31 march 2019.