Main Article Content

nidhi Dahiya
Sunita Rani


Cloud Computing is an information technology type which is used to access information and sharing of data on remote site. By using cloud computing one has not to worry about load of local data storage to store his data. Security And authentication of data is must while using this kind of services. Various factors are presents there which can affect security of data. This paper provide an idea about security and authentication operation .This paper explain some encryption scheme as well as RSA and how to improve security of a data using Symmetric Tokens. This paper proposes a multilevel authentication technique that helps us to enhance the security of data storage in the cloud computing systems. We provide combined approach DES and AES using RSA to protect clients’ authentication data such as user name and password.


Download data is not yet available.

Article Details




A. T. Velte, T. J. Velte, R. Elsenpeter, “Cloud Computing, A Practical approach†First Edition, 2009.

M. E. Whiteman, H. J. Mattord, "Principles of Information Security ,"Fourth Edition,

N. Vurukonda, B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," 877-0509 © 2016 DOI: 10.1016/j.procs.2016.07.335.

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,â€IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, May 2011.

S. Kumar and R.Subramanian , “An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing,†IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011.

Dr. S. A. Abbas, A. A. B. Maryoosh, “Improving Data Storage Security in Cloud Computing Using Elliptic Curve Cryptography,†Journal of Computer Engineering, Volume 17, Issue 4, Ver. I, PP 48-53 DOI: 10.9790/0661-17414853 (July – Aug. 2015).

K.Govinda, Dr. E. Sathiyamoorthy, "Identity Anonymization and Secure Data Storage using Group Signature in Private Cloud", Published by Elsevier Ltd., Procedia Technology, April, 2012.

Z .C. Nxumalo, P. Tarwireyi, M. O. Adigun," Towards Privacy with Tokenization as a Service," Department of Computer Science, University of Zululand ,Empangeni, South Africa IEEE-©2014.

S. Subashini, V. Kavitha -Anna University Tirunelveli, India,†A survey on security issues in service delivery models of cloud computing“ ELSEVIER- Journal of Network and Computer Applications Volume 34, Issue 1, January 2011, Pages 1–11.

Prof. S. R. Pardeshi, Prof. V. J. Pawar, Prof. K. D. Kharat," Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques",

C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,†Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, Jan. 2013.

P. Gupta, A. Seetharaman, J. R. Raj, “The usage and adoption of cloud computing by small and medium businesses,†International Journal of Information Management, vol. 33, no. 5, pp. 861 – 874, 2013.

A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defense to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1097 – 1107, 2011.

M. Alouane, H. E. Bakkali,"Security, Privacy and Trust in Cloud Computing: A Comparative Study" 00 ©2015 IEEE

M. P. Babitha, K. Remesh Babu," Secure Cloud Storage Using AES Encryption", (ICACDOT) ©2016 IEEE

S. Bugiel, S. Nürnberger, A. R. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing,†in Workshop on Cryptography and Security in Clouds, WCSC, 2011, vol. 2011.

A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-Based Cloud Computing,†in Trust and Trustworthy Computing, vol. 6101, Eds. Springer Berlin Heidelberg, pp. 417–429, 2010.

U. Somani, K. Lakhani, and M. Mundra, “Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing,†in Parallel Distributed and Grid Computing (PDGC), 1st International Conference on, pp-2010.

M. k. Sarakar, S. Kumar, "A Framework to Ensure Data Storage Security in Cloud Computing," IEEE 1–216, 2016.

H. Ziglari, S. Yaahiya," Deployment Models: Enhancing Security in Cloud Computing Environment," IEEE ©2016.

A. Albugmi, Madini , A. R. Walters and G. Wills," Data Security in Cloud Computing," IEEE ©2016.

M. Abdelhamid, PhD thesis, “Privacy-preserving Personal Information Managementâ€, School of Computer Science, McGill University, Montreal, August 2009.

Y. Tabbii, I. Enjajjar, A. bankaddour," Security in Cloud Computing approaches and solutions," IEEE ©2014.

P. Garg, V. Sharma, "An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function", IEEE ©2014.

M. Batra, A. Arora, "Implementing Data Security in Cloud Computing," International Journal of Advance Research in Computer Science and Management Studies Volume 4, Issue 6, pg. 213-218,ISSN: 2321-7782, June 2016.

Mr. V. Biksham, Dr. D. Vasumathi, "Query based computations on encrypted data through homomorphic encryption in cloud computing security," International Conference on Electrical, Electronics, and optimization Techniques (ICEEOT) ©2016.

S. Bollavarapu and B. Gupta, “Data Security in Cloud Computingâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.

A. Kumar, H. Prasad, S. Chandra, "Homomorphic Token and Distributed Erasure-Code for cloud," International Journal of Research in Computer and Communication Technology, Vol 2, Issue 10, ISSN (Online) 2278- 5841, October- 2013.