Cloud Data Center Security and Cryptography a Survey

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-34 Number-1
Year of Publication : 2016
Authors : Mr.KanwarLal Dhakar, Prof. SavitaRathod
DOI :  10.14445/22312803/IJCTT-V34P104

MLA

Mr.KanwarLal Dhakar, Prof. SavitaRathod "Cloud Data Center Security and Cryptography a Survey". International Journal of Computer Trends and Technology (IJCTT) V34(1):15-28, April 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is a powerful weapon for human now in these days, these data environment is able to provide the computational ability, software services, data storage and other important applications remotely. Using these remotely accessible services is used for various levels of application development and deployments. The proposed work is intended to design a security system for cloud data centers, these data centers are used for storage of various sensitive and confidential data therefore security is a major concern about the data.in this presented work a survey on the cloud computing technology and the existing security techniques are provided. Additionally a new security technique is proposed which is used to prevent the data during the authentication based issues, transmission based issues and storage based issues.

References
[1] Nidhi Khurana, Dr. Rattan Datta, Logical Data Model For Cloud Computing, Volume 3, Issue 4, April 2013 ISSN: 2277 128XInternational Journal of Advanced Research inComputer Science and Software Engineering.
[2] Introduction to Cloud Computing, White Paper,Dialogic, 2013.
[3] Nariman Mirzaei,CloudComputing,Fall 2008,Community Grids Lab, Indiana University Pervasive Technology Institute. [4] Mike Ricciuti, ?Stallman: Cloud computing is `stupidity`, http://news.cnet.com/8301-1001_3-10054253-92.html.
[5] Cong Wang and Kui Ren,Wenjing Lou,Jin Li, Toward Publicly Auditable Secure Cloud Data Storage Services, IEEE Network July/August 2010,0890-8044/10/$25.00 © 2010 IEEE.
[6] John Harauz,Lori M. Kaufman,BrucePotter,Data Security in the World of Cloud Computing, JULY/AUGUST 200915407993/09/$26.00 ©2009IEEE COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES.
[7] Balachandra Reddy Kandukuri, Rama Krishna Paturi V, Dr. Atanu Rakshit, Cloud Security Issues, 2009 IEEE International Conference on Services Computing, 978-0- 7695-3811-2/09 $26.00 © 2009 IEEE, DOI 10.1109/SCC.2009.84, 517, 2.
[8] Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, Dr. M. M. A Hashem, A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing securityarchitecture, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 3, No. 10, 2012.
[9] YounisA.Younis,MadjidMerabtiandKashifKifayat,Secure Cloud Computing for CriticalInfrastructure:ASurvey, ISBN: 978-1-902560-27-4 © 2013 PGNet.
[10] Adhu Chauhan, Riidhei Malhotra, Muku Pathak and Uday Pratap Singh, DIFFERENT ASPECTS OF CLOUD SECURITY,Engineering Research and Applications (IJERA), ISSN: 2248-9622, www.ijera.com, Vol. 2, Issue 2, Mar-Apr 2012, pp.864-869.

Keywords
cloud servers, data outsourcing, network transmission, cryptographic cloud, data exchange;