REVIEW ON CLOUD COMPUTING

Alagappa Institute of Skill Development & Computer Centre,Alagappa University, Karaikudi, India.15 -16 February 2017. IT Skills Show & International Conference on Advancements In Computing Resources (SSICACR-2017)

Format: Volume 5, Issue 1, No 21, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: A.R.RahimaYasmin

Reference:IJCS-258

View PDF Format

Abstract

Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost.A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.

References

1. https://en.wikipedia.org/wiki/IDbased_ encryption 2. Goh E-J. Technical Report 2003/216, IACR ePrint Cryptography Archive, 2003. Available from: http://eprint.iacr.org/2003/216. 3. http://www.ijcsit.com/docs/Volume%206/v ol6issue02/ijcsit2015060233.pdf 4. https://en.wikipedia.org/wiki/Attributebased_ encryption 5. Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing. Proceedings of Cryptography 2001, LNCS, Springer-Verlag. 2001; 2139:213–29. 6. Fontaine C, Galand F. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007. 2007 Jan; 1–15. 7. Shamir A. Identity-Based Cryptosystems and Signature Schemes. In Proceedings of Cryptography 1984, LNCS. Springer- Verlag. 1985; 196:47–53.

Keywords

Cloud computing, security threat, multitenantbehaveour,standards,cryptographictecniques,Cloud storage system,Encryption technique and policies.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog