Improved 3-Dimensional Security in Cloud Computing

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-9 Number-5                          
Year of Publication : 2014
Authors : Sagar Tirodkar , Yazad Baldawala , Sagar Ulane , Ashok Jori
DOI :  10.14445/22312803/IJCTT-V9P145


Sagar Tirodkar , Yazad Baldawala , Sagar Ulane , Ashok Jori."Improved 3-Dimensional Security in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V9(5):242-247, March 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is a trending technology in the field of Information Technology as it allows sharing of resources over a network. The reason Cloud computing gained traction so rapidly was because of its performance, availability and low cost among other features. Besides these features, companies are still refraining from binding their business with cloud computing due to the fear of data leakage. The focus of this paper is on the problem of data leakage. It proposes a framework which works in two phases. The first phase consists of data encryption and classification which is performed before storing the data. In this phase, the client may want to encrypt his data prior to uploading. After encryption, data is classified using three parameters namely Confidentiality [C], Integrity [I] and Availability [A]. With the help of proposed algorithm, criticality rating (Cr) of the data is calculated. According to the Cr, security will be provided on the basis of the 3 Dimensions proposed in this paper. The second phase consists of data retrieval by the client. As per the concept of 3D, users who want to access their data need to be authenticated, to avoid data from being compromised. Before every access to data, the user’s identity is verified for authorization. After the user is authorized for data access, if the data is encrypted, the user can decrypt the same.

[1] Meiko Jensen etal, “On technical security issues in cloud computing”, CLOUD `09. IEEE International Conference on Cloud Computing, 2009, 109-116
[2] Cloud Security Alliance “The Notorious Nine: Cloud Computing Top Threats in 2013”.[Online]. Available:
[3] Alertlogic “State of Cloud Security Report | spring 2012”. [Online]. Available:
[4] S. Han, H. Soo, “The Improved data encryption standard (DES) algorithm”, Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on (Volume:3), Sep. 1996
[5] A. Chhabra, “Modified RSA Algorithm: A secure Approach”, 2011 International Conference on Computational Intelligence and Communication Networks (CICN), 2011, 545-548
[6] C. Selvakumar, “Improving cloud data storage security using data partioning technique”, IEEE 3rd International Advance Computing Conference (IACC), 2013, 7-11
[7] P. Prasad, B. Ojha, R. Shahi, R. Lal, A. Vaish, U. Goel, “3 Dimensional Security in Cloud Computing”, 3rd International Conference on Computer Research and Development (ICCRD), 2011, 198-201
[8] A.M. Eljetlawi, “Graphical password : Existing recognition base graphical usability”, 6th International Conference on Networked Computing (INC), 2010, 1-5
[9] S. Acharya, A. Polawar, P. Pawar, “Two factor authentication using smartphone generated one time password”, IOSR Journal of Computer Engineer, Volume 11, 2013
[10] Info Security Products Guide. [Online]. Available at:

Availability, Cloud Security, Confidentiality, Data Leakage, Decryption, Encryption, Integrity