DEVELOPMENT OF BLOWFISH ENCRYPTION SCHEME FOR SECURE DATA STORAGE IN PUBLIC AND COMMERCIAL CLOUD COMPUTING ENVIRONMENT

2018 ◽  
Vol 5 (2) ◽  
pp. 1 ◽  
Author(s):  
SHAFI'I MUHAMMAD ABDULHAMID ◽  
NAFISAT ABUBAKAR SADIQ ◽  
ABDULLAHI MOHAMMED ◽  
NADIM RANA ◽  
HARUNA CHIROMA ◽  
...  
2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


Author(s):  
Hadeel Mushtaq Shakir ◽  
Dr. Syed Zeeshan Hussain

Our understanding of the importance of cloud computing-based electronic commerce in the digital world involves researching and looking for the most important issues faced by electronic commerce and security threats, and user information protection, and as a result, an e-commerce application framework can be proposed which may be based on the concepts, the origins, and development trend of cloud computing which copes with the problem of e-commerce and the storage of resources. As it is on record that cloud computing is widely known for its robust and strong support for data storage and mining. It also offers a most reliable platform for safe, secure, and speedy data transactions at a very manageable cost and a high level of privacy. Therefore, this paper has examined, analyzed, and discussed the current state of e-commerce and also, we provide much literature that has researched the security problems e-commerce faces in a cloud computing environment and some of them suggested some e-commerce security solutions.


2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


Cloud computing has made life easier for user and business. The “cloud” is a server where data, applications and software are stored and can be accessed from any device as long as we have internet connection. Nowadays, security is the main issue in the cloud computing environment because cyber crime is increasing abruptly. The main motive of this paper is to reduce the cyber crime in cloud computing. Cyber crime is the phenomenon which interrupts the privacy and security for data storage, to overcome this cyber security is introduced. Cyber security is protection from unauthorized access that aimed to exploitation from attackers which destroys information system. The inference of this paper is to focus on authentication mechanisms for providing security and preventing cyber crime activities in the cloud


Author(s):  
David Reavis

The physical location for data used in every organization ebbs and flows as technology improves. In the early years of computing, data were stored on the central system because that was the only choice. As communication technology advanced, a decentralized model became popular and data were stored nearer to the place it would be used. Another leap in telecommunications prompted a move back to centralized data storage, mostly because access speeds allowed the data to be used remotely with minimal time lapse due to transmission distance. The most recent transition for housing data is to move data from various databases, some centralized and some localized, into the cloud. The benefits of moving information to a cloud computing environment have made it attractive to organizations recently. Converting data from one platform to another is done regularly by IT professionals. In each of the transitions described above, data had to be converted in some way and transitions to updated computing platforms are not uncommon. In this paper, the term information evaporation will be used to distinguish the move of information to the cloud from other conversion activities, such as system upgrades or platform transitions. Converting data from a traditional database environment to an Internet-based cloud computing environment requires a different approach to security, attention to avoiding creating information silos, and development of data tags, such as eXtensible Markup Language (XML), to facilitate cross platform data access.


2014 ◽  
Vol 635-637 ◽  
pp. 1471-1475
Author(s):  
Hai Yan Chen

In the context of the wide application of cloud computing technology, Internet crimes with the support of such technology will increase. In this article, the author proposed a holistic set of digital forensics method applicable in could computing environment from the point of the four stages of digital evidence collection, preservation, analysis and presentation. In evidence collection session, original resource of electric data collection was discussed. In evidence preservation session, electronic data storage system on Hadoop was designed. In evidence analysis session, two types of crime data were analyzed. In evidence presentation session, what the result should be shown were explained.


Sign in / Sign up

Export Citation Format

Share Document