Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure

Authors

  • Rex Cyril B  Asst.Professor and Research Scholar, Department of Computer Science, St. Joseph's College(Autonomous), Tirchy, Tamil Nadu, India
  • Dr. S. Britto Ramesh Kumar  Asst.Professor and Research Scholar, Department of Computer Science, St. Joseph's College(Autonomous), Tirchy, Tamil Nadu, India

Keywords:

Database as a service (Dbaas), PKI executes, Data security, Data privacy and Data breaches.

Abstract

Cloud computing, a revolutionary term for the long-dreamed idea of computing as an application. Cloud Computing can provide numerous advantages for real world applications, such as rapid useful resource elasticity, on-demand self-service, usage-based pricing, outsourcing, pervasive network access, etc. In Cloud computing, large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. The cloud goals to cut fees, and assist the customers focus on their middle business instead of being impeded by means of IT obstacles. Cloud storage, Data as a Service (DaaS) and Database as a service (DBaaS) are the different phrases used for information management within the cloud. Differ on the basis of how data is stored and managed. Cloud storage is a virtual storage that enables users to store documents and objects. Cloud database should support features of cloud computing as well as of traditional databases for wider acceptability. The potential challenges associated with cloud database are scalability, high availability and fault tolerance, data consistency and integrity, confidentiality and many more. This paper proposes a dynamic and scalable architecture for cloud database services and provides complete protection on data security, data privacy and data breaches on cloud computing with the help of Public Key Infrastructure.

References

  1. Jean Raphael Ngnie Sighom, Pin Zhang and Lin You, "Security Enhancement for DataMigration in the Cloud", 2017.
  2. Kire Jakimoski, "Security Techniques for Data Protection in Cloud Computing", 2016.
  3. Sultan Aldossary, William Allen, "Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions", 2016.
  4. Jyotika Chhetiza, Nagendra Kumar, "A Survey of Security Issues and Authentication Mechanism in Cloud Environment with Focus on Multifactor Authentication", 2016.
  5. Jianfeng Wang, Xiaofeng Chen," Efficient and Secure Storage for Outsourced Data: A Survey", 2016
  6. M. Omer Mushtaq, Furrakh Shahzad, M. Owais Tariq, Mahina Riaz, Bushra Majeed, "An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS)", 2016.
  7. G. Ranjith, J. Vijayachandra, P. Sagarika and B. Prathusha, "INTELLIGENCE BASED AUTHENTICATION - AUTHORIZATION AND AUDITING FOR SECURED DATA STORAGE", 2015.
  8. Nisha Bawaria, Kamlesh Namdeo, Pankaj Richhariya, "High Performance AAA Security for Cloud Computing in Hierarchical Model", 2015.
  9. Shweta Dinesh Bijwe, Prof. P. L. Ramteke, "Database in Cloud Computing - Database-as-a Service (DBaas) with its Challenges", 2015.
  10. Anjali Nayak, Dr. Sadhna K Mishra, "Secure Architecture Using Multiuser Key Distribution for Cloud Database", 2015.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Rex Cyril B, Dr. S. Britto Ramesh Kumar, " Dynamic and Scalable Architecture for Accessing the Cloud Databases and Securing Cloud Services Using Public Key Infrastructure, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.455-459, November-December-2017.