LEVERAGING FRONT LAYER SECURITY MECHANISM IN CLOUD ENVIRONMENT WITH THE APPLICATION OF REA IN MITIGATING DATA SECURITY & RISKS FOR EFFECTIVE SECURITY FEATURES IN THE NEW CLIENT-SITE FRAMEWORK
Saumya Gupta
Vol. 2, Jan-Dec 2016
Page Number: 460 - 472
Abstract:
The centralized computing defines cloud computing as a centralized model that is responsible for providing the network access on-request basis to a shared pool of interconnected computation resources linked together. The same is done to a provision in a quick manner and to be released with minimal management effort or cloud provider interaction. It is a platform that is built to convenient customer interface with an IT framework. The promise made by cloud computing especially shared cloud, can be decked by security infraction, which is indefeasible. Encryption and decryption algorithms have been proposed to maintain the security of the private data that is being transmitted in the cloud scenario. The increasing necessity for the secure cloud storage being handled in a centralized fashion and thereby the enticing effects of the cryptography at client-side help us in prioritizing and combine them together, thereby naming an innovative mechanism for the private data as third-party security and regulation issues. The proposed work provides a more secure framework layer as security to the data, but still, various aspects need to be addressed in the
future. Proposed work is suitable only for selected private data rather than a vast data input by the user on the cloud; we can extend this work for different types of modules with timestamp encryption converted time and efficiency in the future. In the future, the technique of Each Word Secure Authentication would be added to improve cloud security on behalf of private. Based on the security solutions, we will demonstrate a secure new client-side framework with advanced algorithm implementations in this article
References
- Tsai WT, Xin Sun, Balasooriya J. Service-oriented cloud computing architecture. In: Seventh international conference on information technology; 2010. P. 684–9.
- Sadhasivam S. Design and Implementation of an efficient two-level scheduler for cloud computing environment. In: International conference on advances in recent technologies in communication and computing; 2009.
- Mathew A. Security and privacy issues of cloud computing; solutions and secure framework. Int J Multidiscip Res. 2012;2(4):1–5
- Gaur T, Divya Sharma. A secure and efficient client-side encryption scheme in cloud computing. Int J Microw Wirel Technol. 2016;6(1):23–33.
- Sidhu A, Mahajan R. Enhancing security in cloud computing structure by hybrid encryption. Int J Recent Sci Res. 2014;5(1):128–32.
- Kalaivani R. Triple layer security to data in cloud. Int J Comp Sci Inf Technol. 2016;7(2):783– 5.
- Singla, Sanjoli, and Jasmeet Singh. Cloud data security using authentication and encryption technique. Glob Comp Technol. 2013
- Kaur M, Singh H. A review of cloud computing security issues. Int J Adv Eng Technol. 2015;8(3):397.
- Popatrao SV, Ansari MB. Cloud with third party auditor. Int J Eng Res Gen Sci. 2016;4(3):1 4.
- Thuraisingham B. Secure data storage and retrieval in the cloud. In: 6th international conference on collaborative computing: networking, applications and work sharing; 2010.
- Yogeswari, G., and P. Eswaran. Enhancing data security for cloud environment based on AES algorithm and steganography technique. Int J of Adv Res Trends in Eng Techno. 2016;3
- Pareek P. Cloud computing security from single to multiclouds using secret sharing algorithm. Int J Adv Res Comp Eng Technol. 2013;2(12):3261–4.
- Rahul Sharma, Dr. Prateek Jain. An impact of digitalized technologies transformation in healthcare using mobile cloud computing. Indian J Sci Technol. 2016;9(34):1–4.
Back Download