Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - July Issue 2013 by IJCTT Journal
Volume-4 Issue-7                           
Year of Publication : 2013
Authors :Amandeep Kaur, Sarpreet Singh

MLA

Amandeep Kaur, Sarpreet Singh"Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud"International Journal of Computer Trends and Technology (IJCTT),V4(7):2170-2174 July Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Number of users stores their data on Cloud. Data storage security refers to the security of data on the storage media. So, Security is an important factor in cloud computing for ensuring clients data is placed on the secure mode in the cloud. Data must not be stolen by the third party so authentication of client becomes a mandatory task. In this paper, we proposed a new security scheme by using RSA & Twofish algorithm. In this work, both these techniques help to generate a secure key & this key is sending to user by mail service. One more feature of security is added and that is Signature. In this when user stores their data they have to enter a unique signature which will make our scheme more secure and hence the new security scheme helps to increase the security at cloud.

 

References-
[1] Cong Wang, Qian Wang, KuiRen and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing”, In Quality of Service, 2009. 17th International Workshop on, page 19, 2009.
[2] Balachandra Reddy Kandukuri, Rama Krishna Paturi and Dr. AtanuRakshit, “Cloud security issues” In Services Computing, 2009. IEEE International Conference on, page 517520, 2009.
[3] J. Brodkin. Gartner: “Seven cloud-computing security risks”, Infoworld, 2008.
[4] Vamsee Krishna and Sriram Ramanujam,” Data Security in Cloud Computing”, Journal of Computer and Mathematical Sciences,vol. 2, Issue 1, 28 February, 2011.
[5] Hassan Takabi, James B. D. Joshi and Gail-JoonAhn, “Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments” Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, p.393-398, July 19-23, 2010.
[6]Jianyong Chen, Yang Wang, and Xiaomin Wang, “On demand security Architecture for cloud computing”, 0018- 9162/12, published by the IEEE Computer society in 2012.
[7] John Harauz, Lori M. Kaufman and Bruce Potter, ”Data security in the world of cloud computing” published by the IEEE computer and reliability societies in July/August 2009.
[8]Nabendu Chaki, ”A Survey on Security issue in Cloud Computing ” in 6th International conference on Electrical Engineering/Electronics, Computer, Telecommunication and Information Technology, May 2009.
[9]Nils Gruschka and Meiko Jensen ,”Attack surface : A taxonomy for attacks on cloud services” in 2010 IEEE 3rd international conference on cloud computing.
[10] Jintao Liu,School of Electronics and Computer Science University of Southampton, “Cloud Computing Security” ,2009.

Keywords : — Cloud Computing, Data Storage Security, RSA, Signature, Twofish, Window Azure.