Encryption Technique for a Trusted Cloud ComputingEnvironment
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
With varying amount of computing power present with everyone, it has become necessity of the hour to usecloud computing systems. It helps us to store our data within a virtual cloud structure. When we use the cloudstorage mechanism, the computing power gets distributed rather than being centralised. The whole system usesthe internet communication to allow linkage between client side and server side services/applications. Theservice providers may use the cloud platform as a web service platform or a data storage architecture. Thefreedom to use any device and location for cloud management is an added advantage for any user. Maintenanceof such systems is also easy as installation of resources aren’t required in each and every system which is usingcloud services. But along with varying flexibility and multi tenancy in usage comes the question of reliabilityand security. As in public hosting, the client is totally unaware of the security strategies applied by the serviceprovider, it creates a necessity for the end user to save the data from expected threats. One cannot totally relyon the quality of service (QoS) which is guaranteed by host servers. When we look at the security of data in thecloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince thecustomer on security factors. This paper describes a schema that ensures encryption of data using Advanced Encryption Standards. By doing so, the customer services can become quiet secured and thus can help in furtherenhancement of the cloud computing standards.
Authors and Affiliations
Aishwarya Asesh
An Efficient Approach for Outlier Detection in Wireless Sensor Network
Wireless Sensor Networks are those networks which include many sensors, sensors have many sensor nodes that are spread all over the world. A wireless sensor network (WSN) normally has many sensor nodes which ar...
Mining Frequent Patterns on Object-Relational Data
Abstract : Data mining is viewed as an essential part of the process towards knowledge discovery. Through data mining process different kinds of patterns that is frequent pattern and others, are discovered, evaluated and...
Algorithm for Securing SOAP Based Web Services from WSDLScanning Attacks
Abstract: The Web Services are the emerging paradigm of Service Oriented Architecture (SOA) in the modernenterprise computing to achieve interconnection of related applications in an organization in terms of services.A s...
Modulo Search Trees (Plain and Z-Overlapped)
Abstract: This paper exploits the modulo division operation to construct a tree which is termed as Modulo search tree with two versions out of which one is coined as Plain Modulo Search Tree and the other is termed...
Internal & External Attacks in cloud computing Environmentfrom confidentiality, integrity and availability points of view
Abstract: Cloud computing is set of resources and services offered through the Internet. Cloud services aredelivered from data centers located throughout the world. Cloud computing facilitates its consumers byprovi...