Details

Analysing the Security and Cryptographic Features in Cloud

Rishita Tyagi

Manipal University, Jaipur

51-56

Vol: 9, Issue: 3, 2019

Receiving Date: 2019-05-29 Acceptance Date:

2019-08-26

Publication Date:

2019-09-12

Download PDF

Abstract

Distributed computing conveys figuring administrations over the web instead of keeping records on a restrictive group drive or local memory drives. Processing administrations can incorporate workers, storage, information bases, systems administration, and programming. The fundamental explanation and extraordinary benefit of utilizing the cloud are that the client can store and access the put-away information whenever and get every one of its administrations for a minimal expense. Notwithstanding this, Security has consistently been a major worry with distributed computing because the client doesn't directly keep up with the data in the cloud. When the client transfers or stores information during a distributed computing system, the data proprietors will probably not comprehend how their information is being sent. The client is unconscious of whether the data is being gathered, examined, and got to by an outsider. To overcome the security issues, different cryptography techniques are proposed. This paper focused on distributed computing fundamentals and talked about additional cryptography calculations present in the current work.

Keywords: Distributed computing; cloud; cryptography

References

  1. M. A. Vouk, (2008), Cloud computing - Issues, research and implementations; Proc. Int. Conf. Inf. Technol. Interfaces, ITI, pp. 31–40
  2. P. S. Wooley, (February 2011), Identifying Cloud Computing Security Risks; Contin. Educ., vol. 1277.
  3. S. Subashini and V. Kavitha, (January 2011), A survey on security issues in service delivery models of cloud computing; J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11.
  4. C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, (2013), A survey on security issues and solutions at different layers of Cloud computing; J. Supercomput., vol. 63, no. 2, pp. 561–592
  5. V. J. Winkler, (2011), Securing the Cloud; Cloud Comput. Secur. Tech. tactics. Elsevier.
  6. A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, (2012), Security risks and their management in cloud computing; 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128.
  7. T. Mather, S. Kumaraswamy, and S. Latif, (2009), Cloud Security and Privacy, p. 299
  8. F. Yahya, V. Chang, J. Walters, and B. Wills, (2014), Security Challenges in Cloud Storage; pp. 1–6.
  9. Vijaya Pinjarkar, Neeraj Raja, Krunal Jha, Ankeet Dalvi, (2016), Single Cloud Security Enhancement using key Sharing Algorithm; Recent and Innovation Trends in Computing and Communication.
  10. Vijaya Pinjarkar, Neeraj Raja, Krunal Jha, Ankeet Dalvi, (2016), Single Cloud Security Enhancement using key Sharing Algorithm; Recent and Innovation Trends in Computing and Communication.
  11. Swapnila S Mirajkar, Santoshkumar Biradar, (2014), Enhance Security in Cloud Computing; International Journal of Advanced Research in Computer Science and Software Engineering
  12. Ashalatha R, (2012), A survey on security as a challenge in cloud computing, International Journal of Advanced Technology & Engineering Research (IJATER) National Conference on Emerging Trends in Technology.
  13. G. L. Prakash, M. Prateek and I. Singh, (April 2014), Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System; International Journal Of Engineering And Computer Science vol. 3, issue 4, pp. 5215- 5223.
  14. S Mahim, (March 2018), Secure file storage on cloud using cryptography; Mumbai
  15. Ahmed Albugmi Madini, O. Alassafi Robert Walters, (2016), Data Security in Cloud Computing
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.