INFORMATION CHANGE THE WORLD

International Journal of Information Engineering and Electronic Business(IJIEEB)

ISSN: 2074-9023 (Print), ISSN: 2074-9031 (Online)

Published By: MECS Press

IJIEEB Vol.9, No.4, Jul. 2017

Security and Privacy for Data Storage Service Scheme in Cloud Computing

Full Text (PDF, 561KB), PP.7-12


Views:113   Downloads:9

Author(s)

Jayashree Agarkhed, Ashalatha R.

Index Terms

Cloud computing;Cryptography;Optimization;Privacy preserving;Security

Abstract

The cloud computing features aim at providing security and confidentiality to its customers. The business officials have gained maximum profit using the cloud environment. Therefore the critical data moving to and from the cloud server must be secured. The security and confidentiality issue is the most critical challenge that we are facing in today’s world of the cloud environment. The business officials have gained maximum profit accessing the cloud environment. Before the disaster occurrence, the critical data moving to and from the cloud must be preserved. The privacy preservation and cloud security issue is the most serious issue that we are facing in today’s world in cloud era.

Cite This Paper

Jayashree Agarkhed, Ashalatha R.,"Security and Privacy for Data Storage Service Scheme in Cloud Computing", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.9, No.4, pp.7-12, 2017. DOI: 10.5815/ijieeb.2017.04.02

Reference

[1]Latif, Rabia, et al. "Cloud computing risk assessment: a systematic literature review." Future Information Technology. Springer Berlin Heidelberg, 2014. pp. 285-295

[2]Djenna, Amir, and Mohamed Batouche. "Security problems in cloud infrastructure." Networks, Computers and Communications, The 2014 International Symposium on. IEEE, 2014

[3]Rasheed, Hassan. "Data and infrastructure security auditing in cloud computing environments." International Journal of Information Management 34.3 (2014): 364-368

[4]Wenge, Olga, et al. "Data Privacy in Cloud Computing–An Empirical Study in the Financial Industry." (2014)

[5]Dong, Xin, et al. "Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing." Computers & security 42 (2014): 151-164

[6]Sood, Sandeep K. "A combined approach to ensure data security in cloud computing." Journal of Network and Computer Applications 35.6 (2012): 1831-1838

[7]Pasupuleti, Syam Kumar, Subramanian Ramalingam, and Rajkumar Buyya. "An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing." Journal of Network and Computer Applications 64 (2016): 12-22

[8]Yang, Kan, and Xiaohua Jia. "An efficient and secure dynamic auditing protocol for data storage in cloud computing." IEEE transactions on parallel and distributed systems 24.9 (2013): 1717-1726

[9]Wang, Qian, et al. "Enabling public auditability and data dynamics for storage security in cloud computing." IEEE transactions on parallel and distributed systems 22.5 (2011): 847-859

[10]Tang, Jun, et al. "Ensuring security and privacy preservation for cloud data services." ACM Computing Surveys (CSUR) 49.1 (2016): 13

[11]Wei, Lifei, et al. "Security and privacy for storage and computation in cloud computing." Information Sciences 258 (2014): 371-386

[12]Wang, Cong, et al. "Privacy-preserving public auditing for secure cloud storage." IEEE transactions on computers 62.2 (2013): 362-375

[13]Jula, Amin, Zalinda Othman, and Elankovan Sundararajan. "A hybrid imperialist competitive-gravitational attraction search algorithm to optimize cloud service composition." Memetic Computing (MC), 2013 IEEE Workshop on. IEEE, 2013

[14]Arjun, U., and S. Vinay. "A short review on data security and privacy issues in cloud computing." Current Trends in Advanced Computing (ICCTAC), IEEE International Conference on. IEEE, 2016

[15]Agbehadji, Israel Edem, Simon Fong, and Richard Millham. "Wolf search algorithm for numeric association rule mining." Cloud Computing and Big Data Analysis (ICCCBDA), 2016 IEEE International Conference on. IEEE, 2016

[16]Kalra, Mala, and Sarbjeet Singh. "A review of metaheuristic scheduling techniques in cloud computing." Egyptian informatics journal 16.3 (2015): 275-295

[17]Amanpreet Kaur, Bikrampal Kaur, Dheerendra Singh,"Optimization Techniques for Resource Provisioning and Load Balancing in Cloud Environment: A Review", International Journal of Information Engineering and Electronic Business (IJIEEB), Vol.9, No.1, pp.28-35, 2017. DOI: 10.5815/ijieeb.2017.01.04

[18]Jitendra Singh,"Study of Response Time in Cloud Computing", IJIEEB, vol.6, no.5, pp.36-43, 2014. DOI: 10.5815/ijieeb.2014.05.06