Research of data security technology in cloud computing environment

2015 ◽  
pp. 283-286
2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


Author(s):  
Abdullahi Abubakar ◽  
Alhaji Idi Babate ◽  
Abdulhakeem Ishola ◽  
Asma’u Muhammad Sani

Cloud computing holds the possibility to annihilate the needs for setting up of costly computing infrastructure for IT-based services and proffering IT Solutions.  It offers an adaptable IT architecture which is accessible via the internet for lightweight and hand-held compact gadgets. The concept has encouraged numerous folds to improve in the capacity or capabilities of the existing and new software. In the cloud computing environment, the whole data/information is available over a set of networked resources, empowering the information to be accessible via virtual machines. Considering the fact that the cloud computing server may be located in any part of the world beyond the reach and control of users, there are various security issues and privacy challenges that need to be clearly understood with a view to identifying how to mitigate them.  Likewise, there are possibilities of the imminent breakdown of servers which have been witnessed in recent times. This research addresses the security issues connected with cloud computing, provides analysis of the militating factors against the successful implementation of cloud computing and proffers useful recommendations on how to ameliorate identified issues.


2020 ◽  
Vol 151 ◽  
pp. 539-547 ◽  
Author(s):  
Suyel Namasudra ◽  
Debashree Devi ◽  
Seifedine Kadry ◽  
Revathi Sundarasekar ◽  
A. Shanthini

Author(s):  
Howard Hamilton ◽  
Hadi Alasti

Data security in the cloud continues to be a huge concern. The adoption of cloud services continues to increase with more businesses transitioning from on premise technology infrastructures to outsourcing cloud-based infrastructures. As the cloud becomes more popular, users are increasingly demanding control over critical security elements of the data and technology assets that are in the cloud. In addition, there are still cries for greater data and security in the cloud. The goal of this paper is to provide cloud service users with greater control over data security in the cloud while at the same time optimizing overall security in the multi-tenant cloud computing environment. This paper introduces cloud-based intelligent agents that are configurable by the users and are expected to give greater compliance for data security in any of the cloud service models.


Sign in / Sign up

Export Citation Format

Share Document