SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES
avitha K1 , Saravanan V2
Section:Research Paper, Product Type: Journal Paper
Volume-06 ,
Issue-08 , Page no. 34-39, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si8.3439
Online published on Oct 31, 2018
Copyright © Kavitha K, Saravanan V . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Kavitha K, Saravanan V, “SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.08, pp.34-39, 2018.
MLA Citation
MLA Style Citation: Kavitha K, Saravanan V "SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES." International Journal of Computer Sciences and Engineering 06.08 (2018): 34-39.
APA Citation
APA Style Citation: Kavitha K, Saravanan V, (2018). SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES. International Journal of Computer Sciences and Engineering, 06(08), 34-39.
BibTex Citation
BibTex Style Citation:
@article{K_2018,
author = {Kavitha K, Saravanan V},
title = {SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {06},
Issue = {08},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {34-39},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=472},
doi = {https://doi.org/10.26438/ijcse/v6i8.3439}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.3439}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=472
TI - SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES
T2 - International Journal of Computer Sciences and Engineering
AU - Kavitha K, Saravanan V
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 34-39
IS - 08
VL - 06
SN - 2347-2693
ER -




Abstract
Cloud computing is information technology (IT) model that allows the ubiquitous access to shared pools of configurable system resources and higher-level services provisioned with lesser effort. Cloud computing provides number of advantages in information technology. Cloud storage is an essential service of cloud computing that are prevalent as it present low-cost and on-demand utilization of large storage and processing resources. Security is an essential barrier to comprehensive prevalence of cloud computing. Security is mainly prioritized portion for any cloud computing environment during data storage and data transaction. Cloud computing approach is linked with users sensitive data stored both at client’s end and cloud servers. For improving the security level, authentication techniques are used for allowing the authenticated user to access the data. But, complexity of the security is high when decentralization of data over the wide area of network. In addition, existing methods failed to improve the authentication accuracy and data confidentiality. Our main objective of the work is to improve the security level during the data storage and data transaction by using cryptosystem techniques.
Key-Words / Index Term
Cloud computing, ubiquitous, security, data confidentiality, data transaction, data storage
References
[1] Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen and Jin Liu “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, IEEE Transactions on Services Computing, Volume 10, Issue 5, September-October 2017, Pages 701 – 714
[2] Geeta Sharma and Sheetal Kalra, “Identity based secure authentication scheme based on quantum key distribution for cloud computing”, Peer-to-Peer Networking and Applications, Springer, Volume 11, Issue 2, March 2018, Pages 220–234
[3] Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu and Yang Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”, IEEE Transactions on Computers, Volume 65, Issue 6, June 2016, Pages 1992 – 2004
[4] Sheren A. El-Booz, Gamal Attiya and Nawal El-Fishawy, “A secure cloud storage system combining time-based one-time password and automatic blocker protocol”, EURASIP Journal on Information Security, Springer, Volume 13, December 2016, Pages 1-13
[5] Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu and Yi Mu, “EACSIP: Extendable Access Control System with Integrity Protection for Enhancing Collaboration in the Cloud”, IEEE Transactions on Information Forensics and Security, Volume 12, Issue 12, December 2017, Pages 3110 – 3122
[6] Ruhul Amin, Neeraj Kumar, G.P. Biswas, R. Iqbal and Victor Chang, “A Light Weight Authentication Protocol for IoT-enabled Devices in Distributed Cloud Computing Environment”, Future Generation Computer Systems, Elsevier, Volume 78, Part 3, January 2018, Pages 1005-1019
[7] Yong Yu, Man Ho Au Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min, “Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage”, IEEE Transactions on Information Forensics and Security, Volume 12, Issue 4, April 2017, Pages 767 – 778
[8] Nesrine Kaaniche and Maryline Laurent, “Data Security and Privacy preservation in Cloud Storage Environments based on Cryptographic Mechanisms”, Computer Communications, Elsevier, Volume 111, 1 October 2017, Pages 120-141
[9] Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu and Jin Li, “Fine-grained Two-factor Access Control for Web-based Cloud Computing Services”, IEEE Transactions on Information Forensics and Security, Volume 11, Issue 3, March 2016, Pages 484 – 497
[10] Mazhar Ali, Saif U. R. Malik and Samee U. Khan, “DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party”, IEEE Transactions on Cloud Computing, Volume 5, Issue 4, October-December 2017, Pages 642 – 655