Skip to main content

Authentication Key Generator for Data Sharing on Cloud—A Review

  • Conference paper
  • First Online:
Inventive Systems and Control

Abstract

With the help of a sizable quantity of virtual storage, cloud computing provides services through the Internet on demand. The primary benefit of cloud computing is that it relieves users of the need to invest in pricey computer equipment. Lower expenses are related with infrastructure. Researchers are looking at new, relevant technologies as a result of recent breakthroughs in cloud computing and other sectors. Due to its accessibility and scalability for computer operations, both private users and companies upload their software, data, and services into the cloud storage. While switching from local to remote computing provides advantages, there are also a number of security issues and difficulties for both the supplier and the customer. There are many cloud services offered by reputable third parties, which are raising security concerns. The cloud service provider offers its services over the Internet and makes use of numerous online technologies, which raises fresh security concerns. One of the most important requirements for today is online data exchange for greater productivity and efficiency. In this work, we have done a detailed analysis on cloud-based security issues and possible solutions. With this, data owners can save and share the data through online.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. IDC Enterprise Panel (2008) It cloud services user survey, what users want from cloud services providers

    Google Scholar 

  2. O'Neill M (2013) NIST: the NIST definition of cloud computing. Accessed Sept 2013

    Google Scholar 

  3. Amazon: Amazon Web Services: Overview of Security Processes. Accessed Nov 2015

    Google Scholar 

  4. Syam Kumar P, Subramanian R (2011) An efficient and secure protocol for ensuring data storage security in cloud computing. IJCSI Int J Comput Sci 8(6)

    Google Scholar 

  5. Santhosh Krishna BV, Sharma S, Devika K, Sahana Y, Sharanya KN, Indraja C (2022) Review of fake product review detection techniques. In: 2022 second international conference on artificial ıntelligence and smart energy (ICAIS), pp 771–776. https://doi.org/10.1109/ICAIS53314.2022.9742735

  6. Bangari S, Rachana P, Gupta N, Sudi PS, KK Baniya (2022)A survey on disease detection of a potato leaf using CNN. In: 2022 second ınternational conference on artificial ıntelligence and smart energy (ICAIS), pp 144–149

    Google Scholar 

  7. Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In: Semantics Knowledge and Grid ”, 2010 proceedings of the sixth ınternational conference on Nov 1. IEEE, pp 105–112

    Google Scholar 

  8. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  9. Meenakshi Sundaram B, Rajalakshmi B, Aman Singh B, Kumar RS, Arsha R (2022) Disaster relief compensation computational framework. In: 2022 second ınternational conference on artificial ıntelligence and smart energy (ICAIS). https://doi.org/10.1109/ICAIS53314.2022.9742829

  10. Uma N, Prashanth CSR (2020) A detailed analysis of the various frequent itemset mining algorithms. J Adv Res Dynam Cont Syst 12(2 Special Issue):448–454

    Google Scholar 

  11. Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47–54

    Article  Google Scholar 

  12. Rimal BP, Jukan A, Katsaros D, Goeleven Y (2011) Architectural requirements for cloud computing systems: an enterprise cloud approach. J Grid Comput 9(1):3–26

    Article  Google Scholar 

  13. Vijayan A, Meenaskshi B, Pandey A, Patel A, Jain A (2020) Video anomaly detection in surveillance cameras. In: 2022 International conference for advancement in technology (ICONAT). https://doi.org/10.1109/ICONAT53423.2022.9726078

  14. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58

    Article  Google Scholar 

  15. Ashok K, Gurulakshmi AB, Prakash MB, Poornima R, Sneha NS, Gowtham V (2022)A survey on design and application approaches in women-safety systems. In: 2022 8th International conference on advanced computing and communication systems (ICACCS), pp 101–110. https://doi.org/10.1109/ICACCS54159.2022.9784981

  16. Thorsheim P (2015) The final word on the linkedın leak. Accessed Sept 2015

    Google Scholar 

  17. Boampong PA, Wahsheh LA (2012) Different facets of security in the cloud. In: Proceedings of the 15th communications and networking simulation symposium, Mar 26, Society for Computer Simulation International, p 5

    Google Scholar 

  18. Casale A (2013) The dangers of recycling in the cloud

    Google Scholar 

  19. Pearson S (2013) Privacy, security and trust in cloud computing. Springer, London, pp 3–42

    Google Scholar 

  20. Ahmed M, Ansari MD, Singh N, Gunjan VK, Santhosh Krishna BV, Khan M (2022) Rating-based recommender system based on textual reviews using IoT smart devices. Mob Inf Syst 2022, Article ID 2854741, 18p. https://doi.org/10.1155/2022/2854741

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gangireddy Ramya sri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Santhosh Krishna, B.V., Rajalakshmi, B., Mani krishna, E.N., Sai sruthi, G., Ramya sri, G., Ashok, K. (2023). Authentication Key Generator for Data Sharing on Cloud—A Review. In: Suma, V., Lorenz, P., Baig, Z. (eds) Inventive Systems and Control. Lecture Notes in Networks and Systems, vol 672. Springer, Singapore. https://doi.org/10.1007/978-981-99-1624-5_9

Download citation

Publish with us

Policies and ethics