Cloud Computing Security using by Applying Cryptography Technique

Authors

  • Rajesh Keshavrao Sadavarte  Assistant Professor and Head, Netaji Subhashchandra Bose College, Nanded, Maharashtra, India
  • Dr. G. D. Kurundkar  Assistant Professor, Computer Science Department, Shri. Guru Buddhiswami Mahavidyalaya, Purna District Parbhani, Maharashtra, India

DOI:

https://doi.org//10.32628/CSEIT206123

Keywords:

Cloud Computing, Cryptography Techniques, Encryption, Cloud Security, Cloud Storage, Security, Privacy

Abstract

Cloud computing is the provision of computing and storage capacity to users as a service. Cloud storage is a type of networked online storage where data is stored in virtualized storage pools as a subservice of infrastructure as a service (IaaS) in cloud computing. Cloud computing plays a significant role in the efficient use of resources and in the utilization of service. Regardless of the cloud category (e.g. private, public, hybrid or inter-cloud), all service providers rely on domain server data. As a rapid development and deployment of cloud computing and cloud storage, users are increasingly concerned about security and privacy issues involved in these techniques. This paper provides a summary of basic security problems that consist of conventional security issues. It also addresses the additional challenges resulting from the cloud computing paradigm being used by cloud system providers and consumers. In addition, solutions suggested by some researchers are presented with a focus on cryptographic techniques which support secure storage of the cloud.

References

  1. H. S. Badr, B. F. Zaitchik, and A. K. Dezfuli, "A tool for hierarchical climate regionalization," Earth Science Informatics, vol. 8, no. 4, pp. 949-958, May 2015.
  2. I. Panel, C. Change, and P. Ivonne, Climate change 2013: The physical science basis: Working group I contribution to the fifth assessment report of the intergovernmental panel on climate change, Intergovernmental Panel on Climate Change, Ed. Cambridge: Cambridge University Press, 2014.
  3. D. J. Hand, H. Mannila, P. Smyth, and D. J. H, Principles of data mining (Adaptive computation and machine learning). Cambridge, MA: Bradford Books, 2001.
  4. K. Abhishek, A. Kumar, R. Ranjan, and S. Kumar, "A rainfall prediction model using artificial neural network," in Control and System Graduate Research Colloquium (ICSGRC), 2012, IEEE, 2012. Online]. Available: 10.1109/ICSGRC.2012.6287140. Accessed: Nov. 6, 2016.
  5. R. VenkataRamana, B. Krishna, S. R. Kumar, and N. G. Pandey, "Monthly rainfall prediction using Wavelet neural network analysis," Water Resources Management, vol. 27, no. 10, pp. 3697- 3711, Jun. 2013.
  6. B. Wang et al., "Rethinking Indian monsoon rainfall prediction in the context of recent global warming," Nature Communications, vol. 6, p. 7154, May 2015.
  7. ZaheerUllah Khan and Maqsood Hayat, “Hourly based climate prediction using data mining techniques by comprising entity demean algorithm”, Middle-East Journal of Scientific Research 21 (8): pp. 1295-1300, 2014.
  8. Rajesh Kumar, “Decision tree for the weather forecasting”, International Journal of Computer Applications (0975 - 8887) vol.2, August 2013.
  9. D. Gupta and U. Ghose, "A comparative study of classification algorithms for forecasting rainfall," 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Sep. 2015.
  10. A.Geetha And Dr. G.M.Nasira, “Data Mining for Meteorological Applications: Decision Trees for Modeling Rainfall Prediction”, 2014 IEEE International Conference on Computational Intelligence and Computing Research, 18-20 Dec. 2014, Coimbatore, India.
  11. V. B. Nikam and B. B. Meshram, "Modeling rainfall prediction using data mining method: A Bayesian approach," 2013 Fifth International Conference on Computational Intelligence, Modeling and Simulation, Sep. 2013.
  12. Gokila, K.Anand Kumar, A.Bharathi, “clustering and classification in support of climatologyto mineweather data-areview”, international conference computing and intelligence systems, ISSN: 2278-2397, volume:04, pages: 1336-1340, march 2015.
  13. EimanTamah A1-Shammari, Mohsen Amirmojahedi,SahaboddinShamshirband,Dalibor Petkovic NenadT.Pavlovic, Hossein Bonakdari, “estimation of wind turbine wakeeffect by adaptive neuro fuzzy approach”, flow measurement and instrumentation, volume: 45, PP: 1-6, 2015.
  14. Oleg V.Diyvankov, Vladimir A.lykov and Serge A.Terekhoff (1992), “Artificial Neural Networks in WeatherForecasting”, PP: 829-835, February 1st, 1992(in Russia).
  15. Gaurav J.Sawale, Dr.Sunil R.Gupta,”Use of Artificial Neural Network in Data Mining for Weather Forecasting”,International Journal of Computer Science and Applications, ISSN:0974-1011, vol.6, No.2, PP:383-387,April2013.

Downloads

Published

2020-02-15

Issue

Section

Research Articles

How to Cite

[1]
Rajesh Keshavrao Sadavarte, Dr. G. D. Kurundkar, " Cloud Computing Security using by Applying Cryptography Technique, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 1, pp.126-132, January-February-2020. Available at doi : https://doi.org/10.32628/CSEIT206123