Survey on security mechanisms for public cloud data

Author(s):  
V Geetha ◽  
N Laavanya ◽  
S Priyadharshiny ◽  
C Sofeiyakalaimathy
Keyword(s):  
Author(s):  
Yong Yu ◽  
Yannan Li ◽  
Man Ho Au ◽  
Willy Susilo ◽  
Kim-Kwang Raymond Choo ◽  
...  

2018 ◽  
Vol 7 (3.1) ◽  
pp. 128
Author(s):  
Selvam L ◽  
Arokia Renjit J

Recent security incidents on public cloud data storage had raised concerns on cloud data security. Development in the hacking area has risen in the past few years. Due to this, Cyber Security is needed which plays an important role to cover the secret information. Currently, the attack of challenging channel is both the symmetric as well as the asymmetric encryption algorithm. Since, in both criteria the secret key has to be transmitting through a security challenging channel. For this many techniques have been put forward. The Main focus is on the vulnerabilities of the private keys while hoarded in different places for the fast utilization of the round key of the AES algorithm. In the view of the hackers, extracting the private key is nearly as same as obtaining the plain text itself. So, the honey encryption technique is used to futile the attacker by producing the fake key for each and every try of the Key puncher. An indication will be generated automatically to the storage manager when an attempt is made by the attacker. The Honey encryption is the best algorithm to overcome the drawbacks of the AES algorithm but it has some time constraints which are also eliminated here. Thus, eliminating the Brute Force Attack and providing a secure system for storing the secret key.  


2016 ◽  
Vol 9 (12) ◽  
pp. 1748-1758 ◽  
Author(s):  
Suqing Lin ◽  
Rui Zhang ◽  
Mingsheng Wang
Keyword(s):  

2018 ◽  
pp. 181-191
Author(s):  
Srishti Sharma ◽  
Yogita Gigras

The cloud computing field is an emerging field and continuously growing at a fast pace. The data stored on the public cloud is not safe as the attackers can hack or gain unauthorized access to the data and can modify its contents to harm the organizations and the users as well. They pose security threats and risks at various levels. These threats need to be removed and security actions need to be taken at right time to protect the cloud data and resources from being misused by the attackers. Some of the security measures are summarized in order to protect the data.


Sign in / Sign up

Export Citation Format

Share Document