Securing Data Storage by Virtualization in Cloud using Cryptography Protocols

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-57 Number-2
Year of Publication : 2018
Authors : Nuthakki praveena, k.madhavi, Geetha. G
DOI :  10.14445/22312803/IJCTT-V57P117

MLA

Nuthakki praveena, k.madhavi, Geetha. G,"Securing Data Storage by Virtualization in Cloud using Cryptography Protocols". International Journal of Computer Trends and Technology (IJCTT) V57(2):88-93, March 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract
Cloud storage is quickly turning into a green pasture to speculate certain trendy organizations. It provides the user tons of flexibility with the event of varied applications with the design and additionally offers varied price/value and different advantages to the organization. Though cloud computing is gaining quality for its low price of operations and simple implementations and use, one has to be compelled to take care of a number of the protection aspects cherish information loss, privacy, cyber-attacks, and unauthorized access. This paper suggests building a security framework specific to a cloud-based atmosphere by which organizations will manage the safety of their information and protect it from attack, by providing the information with confidentiality and integrity using Elliptic Curve Cryptography.

References
[1] Mr.Jayadip Sen "Security and privacy issues in Cloud Computing"
[2] Elsenpeter Robert, Anthony T.Velte and Toby J.Velthe "Cloud computing a practical approach"
[3] Farzadsabahi, “Cloud computing security threats and Responses”, IEEE confer.2011,978-1-6128-486-2/111..
[4] LiuPeng, the definition and characteristics of cloud computing, http://blog.sina.com.cn/s/blog_5f0da5590100cmxw.html http://www.chinacloud.cn,
[5] Cloud Security "A Comprehensive Guide to secure Cloud Computing" Ronald L. Krutz and Russell DeanVines
[6] H. Takabi, S Kumaraswamy and S Latif "Cloud Security and Privacy", O`REILLY publication, first edition, Sept 2009.
[7] N. Gohring, "Amazon`s S3 down for several hours,"- 2008 .
[8] G. Caronni and M. Waldvogel, “Establishing Trust in Distributed Storage Providers”, In Third IEEE P2P conference, Linkoping 03, 2003
[9] F. Sebe. J. Domingo-Ferrer, and A.Martinez- Balleste. Y. Deswarte, and J.J. Quisquater,"Efficient Remote Data possession Checking in Critical Information Infrastructures" , IEEE Trans knowledge and Data Engineering vol.20, no.8,aug-2008
[10] P. Syam Kumar, R. Subramanian, “Homomorphic Distributed verification protocol for Ensuring Data Storage in Cloud Computing”. Internation Journal of Information, VOL. 14, NO.10, OCT-2011,pp.3476.
[11] M A.Shah, M. Baker, J.C.Mogul, and R.Swaminathan,”Auditing to keep Online Storage Services Honest ”,Proc.11th USENIX Workshop on in Operating systems,2007,pp.1-6,CA,USA.
[12] N. Oualha, M. Onen, Y. Roudier,.,”A Security Protocol For Self-Organizing Data Storage”.Tech Rep.EURECOM+2399,InstituteEureco 2008, France.
[13] Ravi kantSahu and AbhishekMohta, L.K.Awasthi “Robust Data Integration while using Third Party Auditor for Cloud Data Storage Services”,Conf. IJARCSSE,2012,volume2,Issue2,ISSN:2277128x.
[14] Qian Wang and Cong Wang and KuiRen,Wenjing Lou,Jinli “Enabling public Auditability and Data Dynamics for Storage Security in Cloud Computing ” in IEEE transactions on parallel and distributed systems,2011,vol.22,no.5.
[15] Govinda V and Gurunathaprasad, H satshKumar.”Third Party Auditing for Security data Storage in Cloud through digital signature using RSA”,IJASATR,2012,issue 2,vol-4,Issn 2249-9954.
[16] M.Ashah and R.swaminathan and m.baker “Privacy- Preserving Audit and Extraction of Digital Contents”,2011 .
[17] A.F. Barsoum and M.A. Hasan, "Provable possession and replication of data over cloud servers",Center for Applied Cryptographic Research(CACR),University of waterloo,Report2010/32,2010.
[18] L.Chen,G.Guo,"An efficient Remote Data Possession Checking in Cloud Storage", International Journal of Digital content Technology and its applications. Volume 5,Number 4,April 2011,pp.43-50
[19] C.Wang, Q.Wang, K.Ren,N. cao and W.Lou,"Towards Secure and Dependable Storage services in Cloud Computing",Accepted for publication in future issue. Computing.DOI:10.1109/TSC.2011.24 .
[20] Amazon.com, "Amazon Web Services (AWS)", Online at http://aws.amazon.com
[21] D. L. Ponemon, "Security of Cloud Computing Users," 2010.
[22] C. Almond, "A Practical Guide to Cloud Computing Security,"
[23] MeikoJensen ,JorgSehwenk et al., "On Technical Security, Issuesicloud Computing" IEEE.

Keywords
cloud computing, confidentiality, Integrity, Cyber-attacks, Elliptic curve cryptography.