Logo Goletty

Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography
Journal Title Advances in Computer Science and its Applications
Journal Abbreviation ACSA
Publisher Group World Science Publisher
Website http://worldsciencepublisher.org/journals/
PDF (469 kb)
   
Title Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography
Authors M, Sudha
Abstract Abstract – Increasing demand for cloud applications has led to an ever growing need for security mechanisms. Cloud computing is a technique to leverage on distributed computing resources one do not own using internet facility in pay per use strategy on demand. A user can access cloud services as a utility service and begin to use them almost instantly. These features that make cloud computing so flexible with the fact that services are accessible any where any time lead to several potential risks. The most serious concerns are the possibility of lack of confidentiality, integrity and authentication among the cloud users and service providers. The key intent of this research work is to investigate the existing security schemes and to ensure data confidentiality, integrity and authentication. In our model symmetric and asymmetric cryptographic algorithms are adopted for the optimization of data security in cloud computing.  
Publisher World Science Publisher
Date 2012-01-18
Source 2166-2924
Rights Copyright NoticeProposed Creative Commons Copyright Notices1. Proposed Policy for Journals That Offer Open AccessAuthors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work´s authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal´s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).Proposed Policy for Journals That Offer Delayed Open AccessAuthors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work´s authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal´s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).

 

See other article in the same Issue


Goletty © 2024