Data storage security in Cloud

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract : Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale industry, Data security has become the most important issue of cloud computing security. Though many solutions have been proposed, many of them only considers one side of security ;this paper proposes the cloud data security must be considered to analyze the data security risk, the data security requirements, deployment of security functions and the data security process through encryption. Distribution of file is done on cloud servers with token generation. The security architecture of the system is designed using encoding algorithms, which eliminates the fraud that occurs today with stolen data. There is no danger of any data sent within the system being intercepted, and replaced. The system is acceptably secure, but that the level of encoding has to be stepped up as computing power increases. Results in order to be secured the system the communication between modules is encoded. Since the customer does not have control over data the cloud provider should assure the customer that data is not modified. In this paper a data correctness scheme is proposed in which a cloud service provider assures the user that the data is stored in the cloud is safe. This scheme also achieves the integration of storage correctness insurance and data error localization i.e., the identification of misbehaving server(s).

Authors and Affiliations

Mrs. Niyamat Ujloomwale, Mrs. Ranjana Badre

Keywords

Related Articles

 An Analysis of VANET Topology Based Routing Approach on Various Parameters

 Abstract: Vehicular ad hoc network (VANET) is a peculiar subclass of mobile ad-hoc network (MANET) that has the potential in improving road safety and in providing travellers comfort. Currently it has gained an imp...

 Quantum Key Distribution Protocols: A Review

 Abstract : Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protoc...

Review of The Image Compression And Enhancement Techniques

Abstract: The image processing is used in order to enhance the image. The image processing will reduce the noise from within the image. The noise will reduce the clarity of the image. There could be many reasons by which...

A Review of Information Security Preparedness Evaluation Mechanisms in Law Enforcement Agencies

Abstract: Law enforcement agencies being the primary security organs in a country are highly prone to information and network attacks due to the sensitivity nature of the information they deal with in their day to day op...

A Non Conventional Energy Based Mobile Charger towards Green Computing

Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twi...

Download PDF file
  • EP ID EP94641
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

Mrs. Niyamat Ujloomwale, Mrs. Ranjana Badre (2014).  Data storage security in Cloud. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 50-56. https://europub.co.uk/articles/-A-94641