A Survey on “A Client Server Mutual Authentication Scheme for Cloud Data Center Security”

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-31 Number-1
Year of Publication : 2016
Authors : Ruchi Goyal, Vijay Verma


Ruchi Goyal, Vijay Verma "A Survey on “A Client Server Mutual Authentication Scheme for Cloud Data Center Security”". International Journal of Computer Trends and Technology (IJCTT) V31(1):42-45, January 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is a powerful weapon for human now in these days, it is able to provide the computational ability, software services, data storage and other important applications remotely. These remotely accessible services are used for various levels of application development and deployments. These properties are helping cloud users more efficiently. The proposed work is intended to design a security system for cloud data centers. Data centers are used for storage of various sensitive and confidential data therefore security is a major concern about the data centers. The proposed system is a cryptographic approach that is design to provide secure environment for storage of data with client server mutual authentication scheme.

[1]. Nidhi Khurana, Dr Rattan Datta, Logical Data Model For Cloud Computing, Volume 3, Issue 4, April 2013 ISSN: 2277 128XInternational Journal of Advanced Research inComputer Science and Software Engineering.
[2]. Cong Wang and KuiRen,Wenjing Lou,Jin Li,Toward Publicly AuditableSecure Cloud Data Storage Services,IEEE Network • July/August 2010,0890-8044/10/$25.00 © 2010 IEEE
[3]. John Harauz,Lori M. Kaufman,BrucePotter,Data Security in the Worldof Cloud Computing,JULY/AUGUST 2009■15407993/09/$26.00 © 2009 IEEE■COPUBLISHED BYTHEIEEE COMPUTERANDRELIABILITYSOCIETIES.
[4]. Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. AtanuRakshit, Cloud Security Issues,2009 IEEE International Conference on Services Computing, 978-0-7695-3811-2/09 $26.00 © 2009 IEEE, DOI 10.1109/SCC.2009.84, 517, 2.
[5]. Kawser WazedNafi, Tonny ShekhaKar, SayedAnisulHoque, Dr. M. M. A Hashem,A Newer User Authentication, File encryption andDistributed Server Based Cloud Computing securityarchitecture,(IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 3, No. 10, 2012.
[6]. YounisA.Younis,MadjidMerabti andKashifKifayat,Secure Cloud Computing for CriticalInfrastructure:A Survey,ISBN: 978-1-902560-27-4 © 2013 PGNet
[7]. adhu Chauhan, Riidhei Malhotra, Mukul Pathakand UdayPratapSingh,DIFFERENT ASPECTS OF CLOUD SECURITY,Engineering Research and Applications (IJERA), ISSN: 2248-9622, www.ijera.com, Vol. 2, Issue 2, Mar-Apr 2012, pp.864-869.
[8]. D.Gnanavelu, Dr. G.Gunasekaran, Survey on security issues & solutions in cloud computing, international Journal of Computer Trends & Technology (IJCTT), vol.8, no.- 3, Feb-2014.
[9]. Vasant C. Bhagwat,Dr. A.Arul L.S. Kumar, Survey on data security issues in cloud environment, international journal of innovative research in advanced Engg.(IJIRAE), volume- 2, issue -1 ,January-15.

cloud computing, confidential, cryptographic, authentication.