IMPLEMENTING MULTILEVEL DATA SECURITY IN CLOUD COMPUTING
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
REFERENCES
A. T. Velte, T. J. Velte, R. Elsenpeter, “Cloud Computing, A Practical approach†First Edition, 2009.
M. E. Whiteman, H. J. Mattord, "Principles of Information Security ,"Fourth Edition,Chapter-8.P.no-349-395.
N. Vurukonda, B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," 877-0509 © 2016 DOI: 10.1016/j.procs.2016.07.335.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,â€IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, May 2011.
S. Kumar and R.Subramanian , “An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing,†IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011.
Dr. S. A. Abbas, A. A. B. Maryoosh, “Improving Data Storage Security in Cloud Computing Using Elliptic Curve Cryptography,†Journal of Computer Engineering, Volume 17, Issue 4, Ver. I, PP 48-53 DOI: 10.9790/0661-17414853 (July – Aug. 2015).
K.Govinda, Dr. E. Sathiyamoorthy, "Identity Anonymization and Secure Data Storage using Group Signature in Private Cloud", Published by Elsevier Ltd., Procedia Technology, April, 2012.
Z .C. Nxumalo, P. Tarwireyi, M. O. Adigun," Towards Privacy with Tokenization as a Service," Department of Computer Science, University of Zululand ,Empangeni, South Africa IEEE-©2014.
S. Subashini, V. Kavitha -Anna University Tirunelveli, India,†A survey on security issues in service delivery models of cloud computing“ ELSEVIER- Journal of Network and Computer Applications Volume 34, Issue 1, January 2011, Pages 1–11.
Prof. S. R. Pardeshi, Prof. V. J. Pawar, Prof. K. D. Kharat," Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques",
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,†Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, Jan. 2013.
P. Gupta, A. Seetharaman, J. R. Raj, “The usage and adoption of cloud computing by small and medium businesses,†International Journal of Information Management, vol. 33, no. 5, pp. 861 – 874, 2013.
A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defense to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1097 – 1107, 2011.
M. Alouane, H. E. Bakkali,"Security, Privacy and Trust in Cloud Computing: A Comparative Study" 00 ©2015 IEEE
M. P. Babitha, K. Remesh Babu," Secure Cloud Storage Using AES Encryption", (ICACDOT) ©2016 IEEE
S. Bugiel, S. Nürnberger, A. R. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing,†in Workshop on Cryptography and Security in Clouds, WCSC, 2011, vol. 2011.
A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-Based Cloud Computing,†in Trust and Trustworthy Computing, vol. 6101, Eds. Springer Berlin Heidelberg, pp. 417–429, 2010.
U. Somani, K. Lakhani, and M. Mundra, “Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing,†in Parallel Distributed and Grid Computing (PDGC), 1st International Conference on, pp-2010.
M. k. Sarakar, S. Kumar, "A Framework to Ensure Data Storage Security in Cloud Computing," IEEE 1–216, 2016.
H. Ziglari, S. Yaahiya," Deployment Models: Enhancing Security in Cloud Computing Environment," IEEE ©2016.
A. Albugmi, Madini , A. R. Walters and G. Wills," Data Security in Cloud Computing," IEEE ©2016.
M. Abdelhamid, PhD thesis, “Privacy-preserving Personal Information Managementâ€, School of Computer Science, McGill University, Montreal, August 2009.
Y. Tabbii, I. Enjajjar, A. bankaddour," Security in Cloud Computing approaches and solutions," IEEE ©2014.
P. Garg, V. Sharma, "An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function", IEEE ©2014.
M. Batra, A. Arora, "Implementing Data Security in Cloud Computing," International Journal of Advance Research in Computer Science and Management Studies Volume 4, Issue 6, pg. 213-218,ISSN: 2321-7782, June 2016.
Mr. V. Biksham, Dr. D. Vasumathi, "Query based computations on encrypted data through homomorphic encryption in cloud computing security," International Conference on Electrical, Electronics, and optimization Techniques (ICEEOT) ©2016.
S. Bollavarapu and B. Gupta, “Data Security in Cloud Computingâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
A. Kumar, H. Prasad, S. Chandra, "Homomorphic Token and Distributed Erasure-Code for cloud," International Journal of Research in Computer and Communication Technology, Vol 2, Issue 10, ISSN (Online) 2278- 5841, October- 2013.