A Security Frame work for Data Storage in Cloud Computing by Using Cryptographic Approaches

Authors

  • Mangalampalli Sesha Sai Lakshmi Lavanya  Assistant Professor, CSE (DS) Department, CMR Engineering College, Hyderabad, India
  • T Virajitha  Assistant Professor, CSE (DS) Department, CMR Engineering College, Hyderabad, India
  • A Divya Reddy  Assistant Professor, CSE Department, CMR Engineering College, Hyderabad, India
  • B. Sree Saranya  Assistant professor, CSE(AI&ML), CMR Engineering College, Hyderabad, India

DOI:

https://doi.org/10.32628/CSEIT228659

Keywords:

Data security, Privacy, Integrity, Trust, Secure data storage, Cloud Computing, Cryptography, Hybrid model.

Abstract

Cloud computing has revolutionized the way data is stored, processed, and accessed. However, with the widespread adoption of cloud services, ensuring the security and privacy of data has become a paramount concern. This paper presents a comprehensive security framework for data storage in cloud computing, leveraging cryptographic approaches. The proposed framework aims to protect data confidentiality, integrity, and availability throughout its lifecycle in the cloud. It explores various cryptographic techniques, including encryption, access control mechanisms, and key management protocols. Additionally, the paper discusses the challenges and considerations associated with implementing cryptographic security measures in cloud storage and provides recommendations for a robust and efficient security framework.

References

  1. A. Jaberi , M.F Data integrity and Privacy model in cloud computing, Biometrics and Security Technologies(ISBAST)2014, PP 280-284.
  2. N. Jose and C. Kanmani, Data Security Model enhancement in Cloud Environment, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 2 , PP 01-06.
  3. B. Goswami, and Dr..S.N. Singh, Enhance security in cloud computing using public key cryptography with matrices, International Journal of Engineering Research and Applications,vol.2,issu.4,pp.339-344,2012.
  4. D W. Chadwick and K. Fatema, A privacy preserving authorization system for the cloud, Journal of Computer and System Sciences , 2012,PP 1359-1373.
  5. C. Mont, and Pearson, An Adaptive Privacy Management System for Data Repositories, Trust, Privacy and Security in digital business,Volume 3592, 2005, pp 236-245.
  6. Khan, S.M. and K.W. Hamlen., Anonymous Cloud: A Data Ownership Privacy Provider Framework in Cloud Computing. in Trust, Security andPrivacy, Computing and Communications (TrustCom), 2012 IEEE 11thInternational Conference on. 2012.
  7. S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 2011. 34(1): p. 1-11.
  8. C. Ning., et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data, INFOCOM, 2011 Proceedings IEEE. 2011.
  9. S. Pearson, Taking Account of Privacy when Designing CloudComputingServices,” ICSE’09 workshop,Vancouver,canada,978-1-4244-3713-9-09,IEEE,Page no 44-52 (2009)
  10. C.Saravanakumar and C.Arun, Survey on Interoperability, Security,Trust, Privacy Standardization of Cloud Computing, ContemporaryComputing and Informatics (IC3I), 2014, pp 997- 982.
  11. Supriya, M., Sangeeta, K., & Patra, G. K. (2016). “A fuzzy based hierarchical trust framework to rate the cloud serviceproviders based on infrastructure facilities”. International Journal of Performability Engineering, 12(1), 55-62.
  12. Supriya, M., Sangeeta, K., & Patra, G. K. (2014). “Estimation of trust values for varying levels of trustworthiness based on infrastructure as a service”. Paper presented at the ACM International Conference Proceeding Series, 10-11-October-201410.1145/2660859.2660921.
  13. William Stallings. “Cryptography and Network Security Principles and, Pearson Education”, Inc., publishing asprentice Hall.
  14. Santhanalakshmi, S., Sangeeta, K., & Patra, G. K. (2017).“Design of secure cryptographic hash function using softcomputing techniques”. International Journal of Advances in Soft Computing and its Applications, 9(2), 188-203.
  15. Jonathan Katz & Yehuda Lindell (2015). “Introduction to Cryptography Modern”. [7] Nasrin Khanezaei, Zurina Mohd Hanapi, (2014). “AFramework Based on RSA and AES Encryption Algorithms for Cloud Computing Services” in 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014), 12 – 14 December 2014, Kuala Lumpur, Malaysia.
  16. Hamza Ali Olwan ,Mohammed Khalifa Musa, (2017).“Hybrid Model Based on RSA Algorithm Combines with OneTime Pad Algorithm to Improve Security and performance” in Imperial Journal of Interdisciplinary Research (IJIR) Vol-3, Issue-5, 2017 ISSN: 2454-1362.
  17. Yun Huang , Zheng Huang , Haoran Zhao , Xuejia Lai, (2013). “A new One-time Password Method” in 2013 International Conference on Electronic Engineering and Computer Science..
  18. AL.Jeeva, V.Palanisamy & K.Kanagaram, P.(2012). “Comparative Analysis of Performance Efficiency and security Measures of some Encryption Algorithm”.
  19. Chia-Long Wu; Chen-Hao Hu. (2012). “Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Application”, 2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications, Pages: 307 – 311.

Downloads

Published

2023-08-30

Issue

Section

Research Articles

How to Cite

[1]
Mangalampalli Sesha Sai Lakshmi Lavanya, T Virajitha, A Divya Reddy, B. Sree Saranya, " A Security Frame work for Data Storage in Cloud Computing by Using Cryptographic Approaches" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 4, pp.110-120, July-August-2023. Available at doi : https://doi.org/10.32628/CSEIT228659