Volume- 3
Issue- 1
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Kavita Rathi , Narender
Cloud computing is a vastly growing information technology and its space continues to evolve at an astounding pace. It provides efficient model for organizations to take services over internet. Its professional services such as computing, software, data storage, hardware and network are growing like no other. Data storage service has been used in engineering, medical, private sectors. Now in many countries government also looks towards cloud to store their data known as g-cloud. In current time if any industry is evaluating technology replacements, upgrades or acquisitions, cloud has to be on their list of considerations. Apart from these cloud services have limitations because of lack in data security due to which in past many time cloud services have been interrupted. Data must be secured in cloud by use of effective encryption algorithms in proper way with the help of data security models. This paper covers data security issues in cloud, data security models and their comparisons.
[1]Dr. P Dinadayalan, S Jegadeeswari and Dr. D Gnanambigai, “Data security issues in cloud environment and solutions”, In IEEE, International conference on cloud computing, pp. 88, 2014.
[2] V.Nirmala, R.K.Sivanandhan and Dr. R.Shanmuga laks, ”Data confidenciality and intigrity verification using user authenticator scheme in cloud”, In IEEE, 2013.
[3] T V Sathyanarayana and Dr. L. Mary Immaculate Sheela, “Data security in cloud computing”, In IEEE, International Conference on Green Computing, pp. 822-827, 2013.
[4] Tim Mather, Subra Kumaraswamy, and Shaid Latif, “Cloud Security and Privacy “.O’Reilly Media, Inc., 2009.
[5] sneha vasant thakre and deipali V.Gore, “ Comparative study of CIA and revised CIA algorithm”, In IEEE, Fourth International Conference on Communication Systems and Network Technologies, pp.713 to 718, 2014.
[6] Yubo Tan, Xinlei Wang, “Research of cloud computing data security technology” in IEEE, pp-2781-83, 2012.
[7] M. Sugumaran, BalaMurugan and D Kamalraj, “An architecture for data security in cloud computing”, In IEEE, World Congress on Computing and Communication Technologies, pp. 252-255, 2014.
[8] Feng-qing Zhang and Dian-Yuan Han,” Applying agents to the data security in cloud computing”, In IEEE, International Conference on Computer Science and Information Processing, pp. 1126-1128. 2012.
[9] Yin Fan and Wang Lina, “A distribution model for data leakage prevention”, In IEEE, pp 2617-2620, 2013.
[10] Wasin Treesinthuros, “E-commerce transaction security model based on cloud computing”, In IEEE Proceedings, pp. 344 -347,2012.
[11] EmanM.Mohamed and Hatem S. Abdelkader, “Enhanced data security model for cloud computing”, In IEEE, The 8th International Conference on INFOrmatics and Systems (INFOS2012), pp. 12-17, May 2012.
[12] Sandeep K. Sood, “A combined approach to ensure data security in cloud computing”, Journal of Network and Computer Applications, pp. 1831–1838, 2012.
[13] Shuai Han and Jianchuan Xing, “Ensuring data storage security through a novel third party auditor scheme in cloud computing”, In IEEE Proceedings, pp. 264-268, 2011.
[14] Zhang Xin, Lai Song-qing and Liu Nai-wen, “Research on Cloud Computing Data Security Model Based on Multi-dimension”
CSE Department, Deenbandhu Chhotu Ram Universityof Science and Technology, Murthal, India,890220999
No. of Downloads: 4 | No. of Views: 1004
Deepa Ajish.
March 2024 - Vol 12, Issue 2
Sakshi Srivastava, Ruchi Pandey, Shuvam Kumar Gupta, Saurabh Nayak.
November 2023 - Vol 11, Issue 6
Mallisetty Siva Mahesh, Kattamuri B N Ayyappa, Maddela Murali, Mididoddi Surendra Babu, Nagababu Pachhala.
November 2023 - Vol 11, Issue 6