Open Access   Article Go Back

A Review on Analysis of TPA model for Secure Information Retrieval in Cloud Computing

Nitin Kumar Sahu1 , Anuj Kumar Pal2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-7 , Page no. 161-164, Jul-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i7.161164

Online published on Jul 31, 2019

Copyright © Nitin Kumar Sahu, Anuj Kumar Pal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nitin Kumar Sahu, Anuj Kumar Pal, “A Review on Analysis of TPA model for Secure Information Retrieval in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.161-164, 2019.

MLA Style Citation: Nitin Kumar Sahu, Anuj Kumar Pal "A Review on Analysis of TPA model for Secure Information Retrieval in Cloud Computing." International Journal of Computer Sciences and Engineering 7.7 (2019): 161-164.

APA Style Citation: Nitin Kumar Sahu, Anuj Kumar Pal, (2019). A Review on Analysis of TPA model for Secure Information Retrieval in Cloud Computing. International Journal of Computer Sciences and Engineering, 7(7), 161-164.

BibTex Style Citation:
@article{Sahu_2019,
author = {Nitin Kumar Sahu, Anuj Kumar Pal},
title = {A Review on Analysis of TPA model for Secure Information Retrieval in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {161-164},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4738},
doi = {https://doi.org/10.26438/ijcse/v7i7.161164}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.161164}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4738
TI - A Review on Analysis of TPA model for Secure Information Retrieval in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Nitin Kumar Sahu, Anuj Kumar Pal
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 161-164
IS - 7
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
298 311 downloads 165 downloads
  
  
           

Abstract

Today’s businesses are interested in secure data and their applications can be accessible from anywhere using any device. It is able to achieve using cloud technology, but there are implicit challenges to making it realism. What can enterprise businesses do to reap the benefits of cloud technology while ensuring a secure environment for sensitive information? Recognizing those challenges is the first process to finding solutions that work. Increasingly many companies plan to move their local data management systems to the cloud and store and manage their product details on cloud servers. An accompanying issue is how to protect the security of the commercially confidential data, while preserve the ability to search the data. In this paper we are analysis of different securities scheme for encryption of item information and also for data search scheme in cloud computing.

Key-Words / Index Term

Cloud Computing, Cloud Security, Security issues, Information Security

References

[1] YING-SI ZHAO “Secure and Efficient Product Information Retrieval in Cloud Computing” Received February 10, 2018, accepted March 11, 2018, date of publication March 19, 2018, date of current version April 4, 2018
[2] M. J. Atallah, K. Pantazopoulos, J. R. Rice, and E. ESpafford, “Secure outsourcing of scientific computations,” Trends in Software Engineering, vol. 54, pp. 215-272
[3] Cao et al. “Privacy-preserving multi-keyword ranked search over encrypted cloud data”. ieee infocom 2011
[4] Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, "Fine-grained Data Access Control Systems with User Accountability in Cloud Computing", IEEE International Conference on Cloud Computing Technology and Science, 2010.
[5] Younis A. Younis, Kashif Kifayat, Madjid Merabti, "An access control model for cloud computing", Elsevier journal of information security and applications, 2014.
[6] Rongzhi Wang “Research on Data Security Technology Based on Cloud Storage”.
[7] Akhilesh Yadav et al. “Securing Cloud Computing Environment using Quantum Key Distribution”
[8] C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou “Toward secure and dependable storage services in cloud computing” IEEE Trans. Services Comput., 5 (2) (2012), pp. 220-232
[9] Duncan, Adrian, Sadie Creese, and Michael Goldsmith . “Insider attacks in cloud computing.” Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE,2012.