Open Access   Article Go Back

An Efficient Survey on Cloud Security Algorithms

M. Subhashini1 , P. Srivaramangai2

Section:Survey Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 160-164, Mar-2018

Online published on Mar 31, 2018

Copyright © M. Subhashini, P. Srivaramangai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Subhashini, P. Srivaramangai, “An Efficient Survey on Cloud Security Algorithms,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.160-164, 2018.

MLA Style Citation: M. Subhashini, P. Srivaramangai "An Efficient Survey on Cloud Security Algorithms." International Journal of Computer Sciences and Engineering 06.02 (2018): 160-164.

APA Style Citation: M. Subhashini, P. Srivaramangai, (2018). An Efficient Survey on Cloud Security Algorithms. International Journal of Computer Sciences and Engineering, 06(02), 160-164.

BibTex Style Citation:
@article{Subhashini_2018,
author = {M. Subhashini, P. Srivaramangai},
title = {An Efficient Survey on Cloud Security Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {160-164},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=224},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=224
TI - An Efficient Survey on Cloud Security Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - M. Subhashini, P. Srivaramangai
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 160-164
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

A cloud storing process, consisting of a gathering of storage servers, gives storage services larger than the Internet. Storing information in a third party’s cloud system makes severe anxiety over information privacy but they have a chance to retrieve the data from the cloud. General encryption techniques look after information confidentiality, but also boundary the functionality of the storage space system because a few operations are favored over encrypted data. Constructing a protected storage scheme that wires several functions is difficult when the storage space system is scattered and has no middle ability. In future, entry of proxy re-encryption (RSA is an algorithm used by encrypt and decrypt messages) technique and put together it with a decentralized removal code such that a protected circulated storage system is defined. ECC is used to generate the keys data confidentiality.ECC makes keys via the properties of the elliptic bend equation instead of the conventional functionality. The major technical participation is that the proxy re-encryption technique supports encryption operations over encrypted text as well as forwarding actions over encryption and encrypted text. Here, the process fully combines encryption, encoding, and forwarding. Examine and use appropriate parameters for the text dispatched to storage servers and the storing servers accessed by a key server. Extra flexible alteration between the number of storage servers and strength.

Key-Words / Index Term

Cloud computing, cyber security, advanced persistent threats, security metrics, and virtual machine (VM)

References

[1] W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” NIST Spec. Publ., pp. 800–144, 2011.
[2] P. Mell and T. Grance, “The NIST Definition of Cloud Computing.” NIST, 2011.
[3] P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud Migration Research: A Systematic Review,” IEEE Transactions on Cloud Computing, vol. 1, no. 2, pp. 142–157, 2013.
[4] L. Vaquero, L. Rodero-Merino, and D. Morán, “Locking the sky: a survey on IaaS cloud security,” Computing, vol. 91, no. 1, pp. 93–118, Jan, 2011 .
[5] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in thirdparty compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 199–212.
[6] Sakshi kathuria, "A Survey on Security Provided by Multi-Clouds in Cloud Computing", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.23-27, 2018.
[7] B. Krekel, “Capability of the People’s Republic of China to conduct cyber warfare and computer network exploitation,” U.S.- China Economic and Security REview Commission, Northrop Grumman Corp., DTIC Document, 2009.
[8] FedRAMP Security Controls, Federal Chief Information Officer’s Council, [Online]. Available: http://cloud.cio.gov/document/fedramp-security-controls. [Accessed: 29-Oct-2014].
[9] S. Zevin, Standards for security categorization of federal information and information systems. DIANE Publishing, 2009.
[10] M. Walla, “Kerberos Explained,” May, 2000. [Online]. Available: http://technet.microsoft.com/en-us/library/bb742516.aspx. [Accessed: 12-Jan-2014].