Enhanced data security for public cloud environment with secured hybrid encryption authentication mechanisms

被引:0
作者
Prabu S. [1 ]
Ganapathy G. [1 ]
Goyal R. [2 ]
机构
[1] School of Computer Science, Engineering and Applications, Bharathidasan University, Tiruchirappalli
[2] School of Computing Science and Engineering, Vellore Institute of Technology, Vellore
来源
Scalable Computing | 2018年 / 19卷 / 04期
关键词
Cloud computing; Data outsourcing; Data security; Data storage; Encryption model;
D O I
10.12694/SCPE.V19I4.1422
中图分类号
学科分类号
摘要
Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment. © 2018 SCPE.
引用
收藏
页码:351 / 360
页数:9
相关论文
共 18 条
[1]  
Avram M.G., Advantages and challenges of adopting cloud computing from an enterprise perspective, 7th International Conference Interdisciplinarity in Engineering (INTER-ENG 2013), 12, pp. 529-534, (2014)
[2]  
Deshmukh R.V., Devadkar K.K., Understanding DDoS Attack and Its Effect, In Cloud Environment, Procedia Computer Science, 49, pp. 202-210, (2015)
[3]  
Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, pp. 1-11, (2010)
[4]  
Tanzim Khorshed M., Shawkat Ali A.B.M., Wasimi S.A., A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
[5]  
Shinde M.B., Design and Implementation of Asymmetric Cryptography Using AES Algorithm, IJARIIE-ISSN(O)-2395-4396, 1, 4, pp. 371-378, (2015)
[6]  
Sugumar R., Sheik Imam S.B., Data Security in Public Cloud Storage Environment, In-ternational Journal of Engineering Research and Technology (IJERT), 4, 6, pp. 101-105, (2015)
[7]  
Singla S., Singh J., Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm, Global Journal of Computer Science and Technology Software and Data Engineering, 13, 5, (2013)
[8]  
Masala G.L., Ruiu P., Brunetti A., Terzo O., Grosso E., Biometric Authentication and Data Security in Cloud Computing, Int'l Conf. Security and Management, SAM'15, pp. 9-15
[9]  
Kaaniche N., Laurent M., Data Security and privacy preservations in cloud storage environments based on cryptographic mechanisms, Computer Commincations, 111, pp. 120-141, (2017)
[10]  
Khan M.A., A survey on security issues for cloud computing, Journal of Network and Computer Applications, 71, pp. 11-29, (2016)