Security Framework for Receiving of Data Using Digital Signature Algorithm

Authors(2) :-Gopi. A, P. Sireesha

Cloud computing is getting more prominent in the field of software engineering in view of its unwavering quality in putting away and evaluating information remotely. In the nearness situation it is extremely biter to have cell phones as an interface amongst client and server, to access and store information for one's need. Versatile innovation in cloud processing is encourages clients to work on the information for any of the application for their association in versatility. In these viewpoints versatile distributed computing is our current theme of enthusiasm as it is extremely important to secure the information away and access since the transportation of the information is through generally by open system. In this venture the versatile cloud condition is utilized for putting away and evaluating information and along these lines it is needed an effective cloud arrange that is a system for correspondence furthermore, information validation. For verification it is indispensable to outline a security system for portable cloud condition that guarantees better verification of information in the cell phones and in the capacity gadgets. We propose another security structure for accepting of information utilizing the idea of advanced mark.

Authors and Affiliations

Gopi. A
Student, Deaprtment of MCA, RCR Institution of Management & Technology, Tirupathi, India.
P. Sireesha
Assistant Profeesor, Deaprtment of MCA, RCR Institution of Management & Technology, Tirupathi, India

Cloud computing, Security, Digital Signature Algorithm, Cloud Service Provider, Hash

  1. Lysyanskaya, A. R. Tamassia and N. Triandopoulos, 2004. Multicast Authentication in Fully Adversarial Networks, Proc. IEEE Symp. Security and Privacy (SP ’04), pp: 241-253.
  2. Miner, S. and J. Staddon, 2001. Graph-Based Authentication of Digital Streams’, Proc. IEEE Symp. Security and Privacy (SP ’01), pp: 232-246.
  3. Udayakumar, R., V. Khanna, T. Saravanan and G. Saritha, 2013. Retinal Image Analysis Using Curvelet Transform and Multistructure Elements Morphology by Reconstruction, Middle-East Journal of Scientific Research, ISSN: 1990-9233, 16(12): 1798-1800.
  4. Sibghatullah Nasir, 2013. Microfinance in India Contemporary Issues and Challenges. Middle-East Journal of Scientific Research, 15(2): 191-199.
  5. Mueen Uddin, Asadullah Shah, Raed Alsaqour and Jamshed Memon, 2013. Measuring Efficiency of Tier Level Data Centers to Implement Green Energy Efficient Data Centers, Middle-East Journal of Scientific Research, 15(2): 200-207.
  6. Hossein Berenjeian Tabrizi, Ali Abbasi and Hajar Jahadian Sarvestani, 2013. Comparing the Static and Dynamic Balances and Their Relationship with the Anthropometrical Characteristics in the Athletes of Selected Sports, Middle-East Journal of Scientific Research, 15(2): 216-221.
  7. Anatoliy Viktorovich Molodchik, 2013.
  8. Meruert Kylyshbaevna Bissenova and Ermek Leadership Development. A Case of a Russian Talantuly Nurmaganbet. The Notion of Guilt and Business School, Middle-East Journal of Scientific Problems of Legislative Regulations of its Forms. Research, 15(2): 222-228. The Notion of Guilt in the Criminal Law of Kazakstan, Middle-East Journal of Scientific Research, 15(2): 229-236.
  9. Somani, Uma, Kanika Lakhani, and Manish Mundra. "Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing." Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on. IEEE, 2010. [10] Hashizume, Keiko, et al. "An analysis of security issues for cloud computing." Journal of Internet Services and Applications 4.1 (2013): 1-13.
  10. Rani, Sunita, and Ambrish Gangal. "Cloud security with encryption using hybrid algorithm and secured endpoints." International journal of computer science and information technologies 3.3 (2012): 4302- 4304.
  11. Saravanan, N., et al. "An implementation of RSA algorithm in google cloud using cloud SQL." Research Journal of Applied Sciences, Engineering and Technology 4.19 (2012): 3574-3579.
  12. Kumar, K. Vijay, Dr N. Chandra Sekhar Reddy, and B. Srinivas Reddy. "Preserving Data Privacy, Security Models and Cryptographic Algorithms in Cloud Computing." International Journal of Computer Engineering and Applications 7.1 (2015).
  13. V. Vinaya, and P. Sumathi, “Implementation of Effective Third Party Auditing for Data Security in Cloud”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, pp. 382-387, May 2013.s
  14. C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services” IEEE Network, vol. 24, no.4, pp. 19-24, 2010.
  15. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing”, IEEE INFOCOM, pp. 1-9, March 2010.
  16. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing”. IEEE Transactions on Services Computing, vol.5, no.2, pp.220-232, 2012.
  17. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
  18. K. Yang, and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, IEEE Transactions on Parallel & Distributed Systems, vol. 24, no. 9, pp. 1717-1726, 2012.
  19. Y. Zhu, H. Hu, G.-J. Ahn, and S. S. Yau, “Efficient audit service outsourcing for data integrity in clouds,” In Journal of Systems and Software, vol. 85, no. 5, pp. 1083-1095, May 2012.

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 538-542
Manuscript Number : CSEIT184195
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Gopi. A, P. Sireesha, "Security Framework for Receiving of Data Using Digital Signature Algorithm", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.538-542, March-April-2018.
Journal URL :

Article Preview