International Journal of Innovative Research in Engineering and Management
Year: 2014, Volume: 1, Issue: 1
First page : ( 11) Last page : ( 14)
Online ISSN : 2350-0557.
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Nishant Rai , Deepti Gupta
Today, data is more precious than gold. As most of the IT industries and users are migrating to cloud environment, their data is at a higher risk in terms of security. Cloud providers are implementing new security policies to provide better security to their users. Many encryption algorithms like RSA (Rivest Shamir Adleman) or DES (Digital Encryption Standard), provides security in general but in some cases these algorithms may be not so effective thus, the security threat arises when the data is shared between the cloud users. This paper aims to provide a procedure for secure data sharing between cloud users.
1. http://www.webopedia.com/TERM/C/cloud_computing.html
2. Parsi Kalpana ,et al, International Journal of Research in Computer and Communication technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012
3. Subedari Mithila, P. Pradeep Kumar, ”Data Security through Confidentiality in Cloud Computing Environment”, Subedari Mithila et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 , 1836-1840, 2011.
4. Zaigham Mahmood, “Data Location and Security Issues in Cloud Computing”, Proceedings of International Conference on Emerging Intelligent Data and Web Technologies-2011.
5. Vishwa gupta, Gajendra Singh, Ravindra Gupta, “Advance Cryptography algorithm for improving data security”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 1, Jan 2012.
6. V. Sandhya, “A Study on Various Security Methods in Cloud Computing”, International Journal of Advanced Research in Computer Science, Volume 2,No.6, Nov-Dec 2011.
7. Simarjeet Kaur, “Cryptography and Encryption in Cloud Computing”, VSRD International Journal of Computer Science and Information Technology, Vol.2(3), 242-249, 2012.
8. Birendra Goswani, Dr.S.N.Singh, “Enhancing Security in Cloud computing using Public Key Cryptography with Matrices”, International Journal of Engineering Research and Applications, Vol 2, Issue 4, 339-344, July-Aug 2012.
9. G. Jai Arul Jose, C.Sanjeev, Dr. C.Suyambulingom, “Implementation of Data Security in Cloud Computing”, International Journal of P2P Network Trends and Technology, Vol 1, Issue 1, 2011.
10. Duane C Wilson. Giuseppe Ateniese. ‘To Share or Not to Share’ in Client-Side Encrypted Cloud. arXiv 2014
11. http://www.sciencedaily.com/releases/2014/04/14041512525 9.htm
12. http://hub.jhu.edu/2014/04/16/cloud-storage-security-flaw
Assistant Professor, IISE, Department of Computer Application, Lucknow Uttar Pradesh, India. nishant_iise@yahoo.co.in
No. of Downloads: 40 | No. of Views: 1049
Preet Bhutani, Chandra Sekhar Dash.
August 2024 - Vol 11, Issue 4
Tushar Maurya, Saurav Kumar Singh, Vikram Thakur, Sachin Chawla.
June 2024 - Vol 11, Issue 3
Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Upendra Nath Tripathi.
June 2024 - Vol 11, Issue 3