A Unified System to Ensure Data Security In Cloud Computing

Abstract

Cloud computing is the concept implemented to crack the daily computing problems, likes of hardware, software and resource availability unhurried by computer users. Although cloud computing promises lower costs, rapid scaling, easier maintenance, and service availability anywhere, anytime, a key challenge is how to safeguard and build confidence that the cloud can handle user data securely. Since cloud computing is rest on internet, security issues like privacy, data security, confidentiality, and authentication is encountered. In order to get rid of the same, I have preferred to make use of a combination of Symmetric (AES) and Asymmetric key cryptography (RSA) together to offer Confidentiality, Authentication &Integrity.

Authors and Affiliations

Sagar Pudi

Keywords

Related Articles

Efficient Techniques For load balancing and dynamic resource management in cloud

Cloud computing applications are developed using MapReduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numbe...

Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study

Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc netw...

Loss less Data Compression using DCT to Optimize the compression Ratio

This work studies of the problem and demonstrates the viability of the suggested methodology with simulation runs onthe International Symposium on Circuits and Systems (ISCAS) 85 combinational and ISCAS 89 full-scan...

Comparative analysis of clustering of spatial databases with various DBSCAN Algorithms

Clustering is still an important research issue in the data mining, because there is a continuous research in data mining for optimum clusters on spatial data. There are so many types of partition based and hierarcha...

A Study on Security Advances for LEACH in WSN

Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks....

Download PDF file
  • EP ID EP27731
  • DOI -
  • Views 227
  • Downloads 4

How To Cite

Sagar Pudi (2013). A Unified System to Ensure Data Security In Cloud Computing. International Journal of Research in Computer and Communication Technology, 2(11), -. https://europub.co.uk/articles/-A-27731