6 research outputs found

    ASIDSDCCE - A Survey on to Improve Data Security and Data Confidentiality in Cloud Computing Environment

    Get PDF
    Cloud computing refers delivery of computing services such as servers, storage, databases, networking, software, analytics and so on. The several organizations providing these computing services are called cloud providers and typically charge for cloud computing services based on usage. The National Institute of Standards and Technology defines cloud computing by five essential characteristics, three service models, and four deployment models. The essential characteristics are on-demand self-service location-independent resource pooling, broad network access, rapid resource elasticity, and measured service. The main three service models are software as service, platform as a service, and infrastructure as a service. The aim of this survey is to improve the data security and data confidentiality through rectifying the problem in cloud computing environment

    Reveiw of effective data encryption and decryption technique

    Get PDF
    The requirements of information security within an organization have undergone two major changes in the last several decades. Before the wide spread use of data processing equipment, the security of information  felt to be valuable to an organization was provided primarily by physical and administrative means. The collection of tools designed to protect data and to thwart hacker is computer security. Network security measures are needed to protect data during their transmission. This technique for encryption and decryption process to combine two methods ceaser cipher and transposition cipher, ceaser cipher is one of the substitution techniques. A substitution technique is one in which the letters of plain text are replaced by other letter or by numbers or symbols. if the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with cipher text bit patterns. The encryption process is two stages first, to convert the given plaintext into cipher text using ceaser cipher text technique, second stage the cipher converted using transposition technique, the final output is cipher text, The Decryption is the reverse process of the Encryption

    Recoganisation and security guidance of data integrity in cloud storage

    Get PDF
    Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Storage outsourcing of data to cloud storage helps such firms by reducing the costs of storage, maintenance and personnel. It can also assure a reliable storage of important data by keeping multiple copies of the data thereby reducing the chance of losing data by hardware failures. The study deal with the problem of implementing a protocol for obtaining a proof of data possession in the cloud sometimes referred to as Proof of irretrievability (POR). The problem tries to obtain and verify a proof that the data that is stored by a user at remote data storage in the cloud (called cloud storage archives or simply archives) is not modified by the archive and thereby the integrity of the data is assured. The verification systems prevent the cloud storage archives from misrepresenting or modifying the data stored at it without the consent of the data owner by using frequent checks on the storage archives.&nbsp

    FEDSACE: A Framework for Enhanced user Data Security algorithms in Cloud Computing Environment

    Get PDF
    With technological advancements and constant changes of Internet, cloud computing has been today's trend. With the lower cost and convenience of cloud computing services, users have increasingly put their Web resources and information in the cloud environment. Increasing data volume is giving the bigger task of Data Centers to provide a better quality of cloud computing. The main usage of cloud computing is data storage. It is more reliable and flexible to users to store and retrieve their data at anytime and anywhere. the security of cloud computing plays a major role in the cloud computing, as customers often store important information with cloud storage providers but these providers may be unsafe. Customers are wondering about attacks on the integrity and the availability of their data in the cloud from malicious insiders and outsiders, and from any collateral damage of cloud services. These issues are extremely significant but there is still much room for security research in cloud computing. This paper presents a framework for global data security of the cloud with two-level Security model. The proposed framework is intended for adapting a system and the framework allows the network service provider to deploy a security in different data centers dynamically while the customers need more security for increasing the data storage
    corecore