A Review of Secure Data Sharing in Cloud Computing

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-30 Number-3
Year of Publication : 2015
Authors : Surabhi. C. H, B.Gunalan
  10.14445/22312803/IJCTT-V30P127

MLA

Surabhi. C. H, B.Gunalan "A Review of Secure Data Sharing in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V30(3):152-156, December 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
In the areas of computing technologies, cloud computing is the latest advancement. It is highly promising in solving the problems related to high computing with respect to hardware availability, software availability, resource availability and many. Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. In data sharing, security is the main concern. For secure data sharing cryptography is the powerful solution.This paper discuss about various encryption schemes used for secure data sharing in cloud.

References
[1] Anu Rathi, Yogesh Kumar Anish Talwar, “ Aspects of Security in cloud computing”, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1361-1363.
[2] Sajjad Hashemi, “Cloud Computing Technology: Security and Trust Challenges”, International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 5, October 2013.
[3] Sara Qaisar, Kausar Fiaz Khawaja, “ Cloud Computing: Network/Security threats and Countermeasures”,
[4] Pankaj Patidar1,Arpit Bhardwaj, “Network Security through SSL in Cloud Computing Environment”, Pankaj Patidar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (6) , 2011, 2800-2803.
[5] G. Jai Arul Jose, C. Sajeev, Dr. C. Suyambulingom, Implementation of Data Security in Cloud Computing”, International Journal of P2P Network Trends and Technology- Volume1Issue1- 2011.
[6] Prof.Rupali Bagate, Prof.Archana Chaugule, “Cloud Architecture And Security measures: A Review”, International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 1, No. 2, November 2012.
[7] Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, 2012 International Conference on Computer Science and Electronics Engineering.
[8] Vijay.G.R, Dr.A.Rama Mohan Reddy, “Security Issue Analysis in Cloud Computing Environment”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January - February 2013, pp.854-857 85
[9] Prince Jain, “Security Issues and their Solution in Cloud Computing”, International Journal of Computing & Business Research ISSN (Online): 2229-6166.
[10] Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi, “Data Security in Cloud Computing with Elliptic Curve Cryptography”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012
[11] Sanjoli Singla, Jasmeet Singh, “Cloud Data Security using Authentication and Encryption Technique”, ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013
[12] Dr. L. Arockiam, S. Monikandan, “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, ISSN (Print) : 2319-5940 ISSN (Online) : 2278-1021 International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013.
[13] Parsi Kalpana, Sudha Singaraju, “Data Security in Cloud Computing using RSA Algorithm”, Parsi Kalpana ,et al, International Journal of Research in Computer and Communication technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.
[14] Mohit Marwaha, Rajeev Bedi, “Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013 ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814 www.IJCSI.org .
[15] Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Efficiency of Modern Encryption Algorithms in Cloud Computing”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
[16] A. PRIYADHARSHINI, “A Survey On Security Issues And Countermeasures In Cloud Computing Storage And A Tour Towards Multi Clouds”, International Journal of Research inEngineering & Technology (IJRET) Vol. 1, Issue 2, July 2013, 1-10 © Impact Journals.
[17] Y. Ghebghoub, S. Oukid, and O. Boussaid, “A Survey on Security Issues and the Existing Solutions in Cloud Computing”, International Journal of Computer and Electrical Engineering, Vol. 5, No. 6, December 2013.
[18] Ashalatha R,” A Survey On Security As A Challange In Cloud Computing”, International Journal of Advanced Technology & Engineering Research (IJATER) National Conference on Emerging Trends in Technology (NCET-Tech) [19] Patrick Höner, “Cloud Computing Security Requirements and Solutions: a Systematic Literature Review”,
[20] K.L.Neela, Dr.V.Kavitha, “A Survey on Security Issues and Vulnerabilities on Cloud Computing”, K.L.NEELA et al./ International Journal of Computer Science & Engineering Technology (IJCSET).
[21] Rajnish Choubey, Rajshree Dubey, Joy Bhattacharjee, “A Survey on Cloud Computing Security,Challenges and Threats”, Rajnish Choubey et al. / International Journal on Computer Science and Engineering (IJCSE).
[22] Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges” , IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.
[23] Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”.
[24] Komal Kate, Prof. S. D. Potdukhe, “Data sharing in cloud storage with key-aggregate cryptosystem”, International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014 ISSN 2091-2730.
[25] Ramakrishna Jadhav, Snehal Nargundi, “ A Review On Key-Aggregate Cryptosystem For Scalable Datasharing In Cloud Storage”, IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321- 7308.
[26] Garima Kumari, Professor. Lakshmi madhuri, “ Key Aggregate Cryptosystem & Intrusion Detection For Data sharing In Cloud”, Multidisciplinary Journal of Research in Engineering and Technology, Volume 1, Issue 3,Pg.308-317
[27] Rushikesh V. Mahalle, Parnal P. Pawade, “A Review of Secure Data Sharing in Cloud using Key Aggregate Cryptosystem and Decoy Technology”, International Journal of Science and Research (IJSR).
[28] S.M. Hema Latha , S.Ganesh, “A Brief Survey on Encryption Schemes in Cloud Environments”, International Journal of Computer & Organization Trends –Volume 3 Issue 9 – Oct 2013.
[29] Aized Amin Soofi, M.Irfan Khan, Fazal-e-Amin, “ Encryption Techniques for Cloud Data Confidentiality”, International Journal of Grid Distribution Computing Vol.7, No.4 (2014), pp.11-20.
[30] Sherif El-etriby, Eman M. Mohamed, Hatem S. Abdul-kader ,“Modern Encryption Techniques for Cloud Computing”.

Keywords
Types of cloud, Delivery models, Issues, Security techniques, Encryption schemes, KAC.