Beruflich Dokumente
Kultur Dokumente
2, April 2019 5
finishes it, it will be allotted to a different one to reply to high use (which should be controlled to avoid revealing processing)
resource demand. can force a niche between general functions and secure
computing. Another issue is that the software system running
Whether or not the resources are allotted to customers on
demand, they are doing not understand the situation of those on the SCP should be whole sure and verified. This security
allotted resources. demand implies that the software system running on the SCP
ought to be unbroken as straightforward as potential. we will
write in code the sensitive information sets victimisation
random personal keys and to alleviate the chance of key
revealing, we will use tamper-resistant hardware to store a
number of the encryption/decryption keys (i.e., a master that
encrypts all alternative keys).
VI. CONCLUSION
Cloud computing allows users to store their information in
remote storage location. However information security is that
the major threat in cloud computing. Thanks to this several
organizations aren't willing to manoeuvre into cloud
environment. To overcome this, confidentiality, integrity,
accessibility ought to be encapsulated in a very CSP’s Service-
Level Agreement (SLA) to its customers. Otherwise make sure
that any sensitive data isn't place into a public cloud and if any
it's to be hold on in encrypted kind. Effective auditing
mechanisms can also be used for providing information
integrity.
Figure 3: Symmetric encryption
The on top of secret writing techniques have the limitation REFERENCES
that for looking the info from the file, the whole file should be [1] V. Nirmala, R.K. Sivanandhan and Dr.R. Shanmuga Lakshmi, “Data
decrypted. it's a time overwhelming method and therefore Confidentiality and Integrity Verification using User Authenticator
searchable secret writing was introduced. Searchable secret scheme in cloud”, International Conference on Green High Performance
Computing (ICGHPC 2013), Pp. 1-5, 2013.
writing permits build Associate in Nursing index for the file [2] Kumar, B. Gook Lee, H.J. Lee and A. Kumari, “Secure Storage and
containing the keywords and is encrypted and keep together Access of Data in Cloud Computing”, International Conference on ICT
with the file, in order that where as looking the info solely the Convergence (ICTC), Pp. 336-339, 2012.
keywords are decrypted instead of the whole file and search is [3] M.R. Tribhuwan, V.A. Bhuyar and S. Pirzade, “Ensuring Data Storage
Security in Cloud Computing through Two-way Handshake based on
formed thereon. Token Management”, International Conference on Advances in Recent
Technologies in Communication and Computing, Pp. 386-389, 2010.
[4] Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with
Diffie Hellman Key Exchange and AES Encryption Algorithm to
Enhance Data Security in Cloud Computing”, International Conference
on Communication Systems and Network Technologies, Pp. 437-439,
2013.
[5] U. Somani, K. Lakhani and M. Mundra, “Implementing Digital Signature
with RSA Encryption Algorithm to Enhance the Data Security of Cloud
Figure 4: Asymmetric encryption in Cloud Computing”, 1st International Conference on Parallel,
Distributed and Grid Computing (PDGC), Pp. 211-216, 2010.
Integrity [6] M. AlZain, E. Pardede, B. Soh and J. Thom, “Cloud computing security:
From single to multi-clouds,” 45th Hawaii International Conference on In
Another major problem faced by cloud computing is System Science (HICSS), Pp. 5490–5499, 2012.
integrity. Integrity of information means that to form certain [7] M. Sookhak, H. Talebian, E. Ahmed, A. Gani and M. K. Khan, “A
that the info has not been modified by Associate in Nursing review on remote data auditing in single cloud server: Taxonomy and
unauthorized person or in an unauthorized means. it's a open issues”, Journal of Network and Computer Applications, Vol. 43,
Pp. 121–141, 2014.
technique for making certain that the info is real, correct and [8] E. Aguiar, Y. Zhang and M. Blanton, “An overview of issues and recent
safeguarded from unauthorized users. As cloud computing developments in cloud computing and storage security”, In High
supports resource sharing, there's an opening of information Performance Cloud Auditing and Applications. Springer, Pp. 3–33, 2014.
being corrupted by unauthorized users. Digital Signatures may [9] Gul and M. Islam, “Cloud computing security auditing”, In 2nd
International Conference on Next Generation Information Technology
be used for protective the integrity of information. the straight (ICNIT), Pp. 143–148, 2011.
forward means for providing integrity is mistreatment Message [10] E.M. Mohamed, H.S. Abdelkader and S. ElEtriby, “Enhanced data
Authentication Code(MAC). security model for cloud computing”, IEEE 8th International Conference
on in Informatics and Systems (INFOS), Pp. CC–12, 2012.
[11] S. Ramgovind, M.M. Eloff and E. Smith, “The management of security
in cloud computing”, IEEE In Information Security for South Africa
(ISSA), Pp. 1–7, 2010.
[12] F. Sabahi, “Cloud computing security threats and responses”, IEEE 3rd
International Conference on In Communication Software and Networks
(ICCSN), Pp. 245–249, 2011.
[13] X. Wang, B. Wang and J. Huang, “Cloud computing and its key
techniques”, IEEE International Conference on Computer Science and
Automation Engineering (CSAE), Vol. 2, Pp. 404–410, 2011.
[14] [14] S. Aldossary and W. Allen, “Data Security, Privacy, Availability
and Integrity in Cloud Computing: Issues and Current Solutions”, In
Figure 5: Remote auditing mechanism International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 4, 2016.
Availability [15] Latifur Khan and Bhavani Thuraisingham, “Security Issues for Cloud
Computing”, International Journal of Information Security and Privacy
Availability refers to being obtainable and accessible to (IJISP), Vol. 4, No. 2, Pp. 36-48, 2010.
approved users on demand. The aim of availableness in cloud
computing systems is to make sure that its users will use them
at anyplace and at any time