REVIEW ON CLOUD COMPUTING
Alagappa Institute of Skill Development & Computer Centre,Alagappa University, Karaikudi, India.15 -16 February 2017. IT Skills Show & International Conference on Advancements In Computing Resources (SSICACR-2017)
Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost.A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.
1. https://en.wikipedia.org/wiki/IDbased_ encryption 2. Goh E-J. Technical Report 2003/216, IACR ePrint Cryptography Archive, 2003. Available from: http://eprint.iacr.org/2003/216. 3. http://www.ijcsit.com/docs/Volume%206/v ol6issue02/ijcsit2015060233.pdf 4. https://en.wikipedia.org/wiki/Attributebased_ encryption 5. Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing. Proceedings of Cryptography 2001, LNCS, Springer-Verlag. 2001; 2139:213–29. 6. Fontaine C, Galand F. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007. 2007 Jan; 1–15. 7. Shamir A. Identity-Based Cryptosystems and Signature Schemes. In Proceedings of Cryptography 1984, LNCS. Springer- Verlag. 1985; 196:47–53.