Work place: Chandigarh Group of College, Landran Mohali,Punjab
E-mail: Cutemani.shergill@gmail.com
Website:
Research Interests: Information Security, Network Security
Biography
Manpreet kaur is pursuing her Masters in computer science and engineering from Chandigarh Group of college (CGC-COE) Landran,Mohali,Punjab.She received the bachelor of technology degree from BGIET,Sangrur. Her research interests are llies in the field of Cloud Computing. Her current research work is based on the security issues in cloud computing.
By Manpreet kaur Hardeep Singh
DOI: https://doi.org/10.5815/ijieeb.2016.03.04, Pub. Date: 8 May 2016
As cloud computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. Number of users used cloud to store their data. In general terms means encrypted form hackers can easily hack or modify the data because there is no security while uploading the data to cloud server. Due to this problem cloud server can easily deployed. As security is one of the major concerns in cloud environment for preventing data deployment during upload. The best solution for the protection of data privacy is done by encryption the sensitive data before being outsourced to cloud server, which makes effective data utilization a very challenging task. There are a number of security and privacy concerns associated with cloud computing but these issues fall into two broad categories: security and privacy concerns faced by cloud providers and security and privacy concerns faced by their customers. Different set of algorithms have been implemented on cloud environment for enhancing the security but still there are some major concerns like malicious attacks. In previous work on AES based encryption and a SECO based environment were introduced.. In SECO based environment root package generated key by using diffie-hellman algorithm and domain package generated key by using private key of root package. In AES algorithm and SECO based environment individually provided some sort of level encryption. In this both algorithms work on single level encryption approach which may be easily broken by malicious users. So, in proposed work both techniques that is AES and SECO based environment will be combined to provide two level security and also will double the encrypted environment which may not be easily broken by malicious users. Result will be more efficient and secure than the previous work.
[...] Read more.By Hardeep Singh Manpreet kaur
DOI: https://doi.org/10.5815/ijeme.2015.05.04, Pub. Date: 8 Oct. 2015
Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet. Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments. There are number of users used cloud to store their personal data, so that data storage security is required on the storage media. The major concern of cloud environment is security during upload the data on cloud server. Data storage at cloud server attracted incredible amount of consideration or spotlight from different communities. For outsourcing the data there is a need of third party. The importance of third party is to prevent and control unauthorized access to data store to the cloud. This research paper discuss the security issues of cloud storage.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals