Cloud Computing Security and Data Integrity Approaches : A Review

Authors

  • Deep Kumar  Software Engineer, Igniva Solutions Private Limited, Mohali, Punjab, India

Keywords:

RSA, AES, Blow-Fish, Fully Homorphic, and Cloud computing

Abstract

Cloud computing has been widely used in autonomous word application. In today scenario all the users use various applications through internet or mobile phones so that data can be accessed from cloud server. Data has been stored on different servers in distributed manner using cache memory. Data contain private and secret information of various users that must be stored in secure manner so that illegimate users do not able access the information. In this paper various approaches have been discussed that can be used for securityapplications in cloud computing. Various login authentication as well as encryption based approaches can be used in cloud computing process so that data integrity as well as user authentication has been validated.

References

  1. Ahmed DheyaaBasha, Irfan Naufal Umar, and Merza Abbas, Member, IACSIT "Mobile Applications as Cloud Computing: Implementation and Challenge", 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp 467 - 471, 2013.
  2. Alabbadi, M.M "Cloud computing for education and learning: Education and learning as a service (ELaaS)", IEEE Conf. on Interactive Collaborative Learning (ICL), vol.134 , PP 589 - 594, 2011.
  3. Cong Wang, Qian Wang, Kui Ren and Wenjing Lou "Ensuring Data Storage Security in Cloud Computing", IEEE conf. on Parallel Distributed and Grid Computing (PDGC), pp.1-9, 2009.
  4. Farzad Sabahi, "Cloud Computing Security Threats and Responses", IEEE Trans. on Cloud Computing., vol. 11, no. 6, pp. 670 - 684, 2002.
  5. Gaurav Raj, Dheerendra Singh, Abhay Bansal, "Load balancing for resource provisioning using Batch Mode Heuristic Priority in Round Robin (PBRR) Scheduling", Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp.308 - 314, 2012.
  6. Jianfeng Yang, Zhibin Chen "Cloud Computing Research and Security Issues" Computational Intelligence and Software Engineering (CiSE), pp 1 - 3, 2010.
  7. Jaber, A.N. "Use of cryptography in cloud computing", IEEEControl System, Computing and Engineering (ICCSCE), PP 179 - 184, 2013.
  8. Kalagiakos, P. Karampelas, P "Cloud computing learning" IEEEApplication of Information and Communication Technologies (AICT), pp. 1 - 4, 2011.
  9. Mehmet Yildiz, Jemal Abawajy, Tuncay Ercan and Andrew Bernoth "A Layered Security Approach for Cloud Computing Infrastructure" 2009 10th International Symposium on Pervasive Systems, pp 763 - 767, 2009.
  10. Imrul Kayeset al. "Test Case Prioritization for Regression Testing Based on Fault Dependency" 2009 10th International Symposium on Pervasive Systems,pp.3-11, 2013
  11. Mohammed Achemlal, Sa?d Gharoutand Chrystel Gabber "Trusted Platform Module as an Enabler for Security in Cloud Computing" Network and Information Systems Security (SAR-SSI), pp.7-11, 2011.
  12. Sravan Kumar R, AshutoshSaxena "Data Integrity Proofs in Cloud Storage", 2011 Third International Conference on Communication Systems and Networks, PP 23-30, 2011.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Deep Kumar, " Cloud Computing Security and Data Integrity Approaches : A Review, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 3, pp.673-677, March-April-2017.