Open Access   Article Go Back

Multi Security Algorithm Based Security Model to Achieve Confidentiality & Apply Authentication in Cloud Environment: A Survey

Arpit Agrawal1 , Ankit Singh Yadav2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 1051-1054, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.10511054

Online published on Jun 30, 2019

Copyright © Arpit Agrawal, Ankit Singh Yadav . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Arpit Agrawal, Ankit Singh Yadav, “Multi Security Algorithm Based Security Model to Achieve Confidentiality & Apply Authentication in Cloud Environment: A Survey,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1051-1054, 2019.

MLA Style Citation: Arpit Agrawal, Ankit Singh Yadav "Multi Security Algorithm Based Security Model to Achieve Confidentiality & Apply Authentication in Cloud Environment: A Survey." International Journal of Computer Sciences and Engineering 7.6 (2019): 1051-1054.

APA Style Citation: Arpit Agrawal, Ankit Singh Yadav, (2019). Multi Security Algorithm Based Security Model to Achieve Confidentiality & Apply Authentication in Cloud Environment: A Survey. International Journal of Computer Sciences and Engineering, 7(6), 1051-1054.

BibTex Style Citation:
@article{Agrawal_2019,
author = {Arpit Agrawal, Ankit Singh Yadav},
title = {Multi Security Algorithm Based Security Model to Achieve Confidentiality & Apply Authentication in Cloud Environment: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {1051-1054},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4679},
doi = {https://doi.org/10.26438/ijcse/v7i6.10511054}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.10511054}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4679
TI - Multi Security Algorithm Based Security Model to Achieve Confidentiality & Apply Authentication in Cloud Environment: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Arpit Agrawal, Ankit Singh Yadav
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 1051-1054
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
271 213 downloads 232 downloads
  
  
           

Abstract

Due to the sharing of distributed resources through an insecure network in an open environment, cloud faces security issues therefore easy access of data is possible from anywhere. Also due to many reasons security and privacy, issue arises at the same time. Increasing demand of resources and development of new technology are the reason for the open and shared data storage. Therefore, this condition needs the secure data storage services in cloud environment. In the public cloud environment, the service provider is not the trusted provider. Different security issues for data in cloud environment is proposed in this paper with some methods for security services such as confidentiality, authorization and authentication.

Key-Words / Index Term

CloudComputing, Security, ECC, BLOWFISH

References

[1] Bih-Hwang Lee, Ervin Kusuma Dewi, “Data Security in Cloud Computing Using AES under HEROKU Cloud”. 27th Wireless and Optical Communications Conference, IEEE (WOCC2018), 2018.
[2] L. Foster, Y. Zhao, I. Raicu, S.Y. Lu, “Cloud computing and grid computing” 360-degree compared, in: Grid Computing Environments Workshop, GCE’08, Austin, TX, Nov. 12-16, 2008, pp. 1-10.
[3] J.W. Rittinghouse, J.F. Ransome, “Cloud Computing Implementation, Management, and Security”. CRC Press, Boca Raton, 2009.
[4] Deyan Chen; Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on , vol.1, no., pp.647-651, 23-25 March 2012.
[5] Vishwanath s Mahalle, Aniket K Shahade, “Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm”. Power, Automation and communication (INAP), 2014.
[6] V. Chang, C.-S. Li, D. De Roure, G. Wills, R.J. Walters, and C. Chee, “The financial clouds review”. Cloud Computing Advancements in Design, Implementation, and Technologies, vol. 125, 2012.
[7] A. Lopez-Alt, E. Tromer, and V. Vaikuntanathan, “On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption”, in Proceedings of the forty-fourth annual ACM symposium on Theory of computing. ACM, 2012, pp. 1219-1234.
[8] M. Brenner, J. Wiebelitz, G. Von Voigt, and M. Smith, “Secret program execution in the cloud applying homomorphic encryption”, in 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011). IEEE,2011, PP.114-119.