Abstract
Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources. It implies a service oriented architecture type (SOA), reduced information technology overhead for the end-user, great flexibility model, reduced total cost of ownership, on-demand service providing structure and many other things. One of the main concerns of customers is Cloud security and the threat of the unknown. The lack of physical access to servers constitutes a completely new and disruptive challenge for investigators. The Users are store, transfer or exchange their data using public cloud. This paper represents the encryption method for public cloud and also the cloud service provider’s verification mechanism using the third party auditors.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Tripathi, A., Yadav, P.: Enhancing Security of Cloud Computing using Elliptic Curve Cryptography. International Journal of Computer Applications (0975 - 8887) 57(1), 26–30 (2012)
El-Khameesy, N., Rahman, H.A.: A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems. Journal of Emerging Trends in Computing and Information Sciences 3(6), 970–974 (2012)
Nafi, K.W., Kar, T.S., Hoque, S.A., Hashem, M.M.A.: A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture (IJACSA) International Journal of Advanced Computer Science and Applications 3(10), 181–186 (2012)
Govinda, K., Gurunathaprasad, V., Sathishkumar, H.: Third Party Auditing for Secure Datastorage in Cloud through Digital Signature using RSA. International Journal of Advanced Scientific and Technical Research 4(2), 525–530 (2012) ISSN 2249-9954
Kaur, M., Mahajan, M.: Implementing Various Encryption Algorithms to Enhance the Data Security of Cloud in Cloud Computing. VSRD International Journal of Computer Science & Information Technology 2(10), 831–835 (2012)
Kaur, S.: Cryptography and Encryption In Cloud Computing. VSRD International Journal of Computer Science & Information Technology (VSRD-IJCSIT) 2(3), 242–249 (2012); Kaur, A., Bhardwaj, M.: Hybrid Encryption tor Cloud Database Security. International Journal OF Engineering Science & Advanced Technology 2(3), 737–741 (2012)
Sudha, M., Monica, M.: Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Data Secuity. Advances in Computer Science and its Applications 1(1), 32–37 (2012)
Gampala, V., Inuganti, S., Muppidi, S.: Data Security in Cloud Computing with Elliptic Curve Cryptography. International Journal of Soft Computing and Engineering (IJSCE) 2(3), 138–141 (2012) ISSN: 2231-2307
Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic Encryption Applied to the Cloud Computing Security. In: Proceedings of the World Congress on Engineering (WCE 2012), London, U.K., July 4-6, vol. I, pp. 536–539 (2012)
Bhagat, A., Sahu, R.K.: Using Third Party Auditor for Cloud Data Security: A Review. International Journal of Advanced Research in Computer Science and Software Engineering 3(3), 34–39 (2013)
Saravanan, N., Mahendiran, A., Venkata Subramanian, N., Sairam, N.: An Implementation of RSA Algorithm in Google Cloud using Cloud SQL. Research Journal of Applied Sciences, Engineering and Technology 4(19), 3574–3579 (2012)
Bhosale, P., Deshmukh, P., Dimbar, G., Deshpande, A.: Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption. International Journal of Engineering Research & Technology (IJERT) 1(8), 1–8 (2012)
Radhika, G., Satyanarayana, K.V.V., Tejaswi, A.: Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms. International Journal of Computer Trends and Technology 4(3), 375–380 (2013)
Marwaha, M., Bedi, R.: Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing. IJCSI International Journal of Computer Science Issues 10(1(1)), 367–370 (2013)
Nigoti, R., Jhuria, M., Singh, S.: A Survey of Cryptographic Algorithms for Cloud Computing. International Journal of Emerging Technologies in Computational and Applied Sciences 4(2), 141–146 (2013)
Mishra, A., Gupta, D.K., Sahoo, G.: BIT Mesra Ranchi, Jharkhand. The Secure Data Storage in Cloud Computing Using Hadamard Matrix. International Journal of Engineering Science and Innovative Technology (IJESIT) 2(2), 389–395 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Boopathy, D., Sundaresan, M. (2014). Securing Public Data Storage in Cloud Environment. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Advances in Intelligent Systems and Computing, vol 248. Springer, Cham. https://doi.org/10.1007/978-3-319-03107-1_61
Download citation
DOI: https://doi.org/10.1007/978-3-319-03107-1_61
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03106-4
Online ISBN: 978-3-319-03107-1
eBook Packages: EngineeringEngineering (R0)