IJWMT Vol. 6, No. 1, 8 Jan. 2016
Cover page and Table of Contents: PDF (size: 516KB)
Full Text (PDF, 516KB), PP.23-33
Views: 0 Downloads: 0
Cloud computing security, cryptography techniques and client-side encryption
Computation process has changed itself from desktop computing to cluster computing and to grid computing and now a days it goes towards cloud computing. In today's trend, Cloud computing is being preferred by majority of the organization because of its major advantages in terms of scalability and multi tenancy. Among all these advantageous features of cloud computing, the only hitch is the security of the data that is stored in the cloud. The security clause rests with the cloud service provider but security can be applied on client side also and it is possible if the user knows how his data is secured. This paper proposes a mechanism which can help the user to ensure the security of his data at the client-side.
Tania Gaur, Divya sharma,"A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.6, No.1, pp.23-33, 2016.DOI: 10.5815/ijwmt.2016.01.03
[1] T. Gaur and N. Kharb, "Security of Data Storage in Cloud Computing," in International Journal of Computer Applications, Vol. 110, No. 10, pp: 15-18, 2015.
[2] P. Mell and T. Grance, "The NIST definition of cloud computing," 2011.
[3] Dropbox confirms security glitch--no password required, http://news.cnet.com/8301-31921_3-20072755-281/dropbox-confirms-security-glitch-no-password-required/.
[4] Tresorit, "Tresorit," [Online]. Available: https://tresorit.com/.
[5] Ben Martini and Kim-Kwang Raymond Choo, "Cloud storage forensics: own Cloud as a case study." Digital Investigation 10.4, pp: 287-299, 2013.
[6] BoxCryptor, "Introduction," [Online]. Available: https://www.boxcryptor.com/en.
[7] Viivo, "Viivo – Introduction," [Online]. Available: https://viivo.com/.
[8] CloudFogger, "CloudFogger - Introduction," [Online]. Available: http://www.cloudfogger.com/en/.
[9] Mager Thomas, Ernst Biersack, and Pietro Michiardi. "A measurement study of the Wuala on-line storage service." In Peer-to-Peer Computing (P2P), 2012 IEEE 12th International Conference, pp. 237-248, IEEE, 2012.
[10] SpiderOak, "SpiderOak – Features," [Online]. Available: https://spideroak.com/features/.
[11] TeamDrive, "TeamDrive – Introduction," [Online]. Available: www.teamdrive.com/.
[12] B. A. Forouzan, "Cryptography & Network Security." McGraw-Hill, Inc, 2007.
[13] N. Tirthani and R. Ganesan, "Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography," in IACR Cryptology ePrint Archive, pp:49, 2014.
[14] http://aws.amazon.com/s3/.
[15] Wazir Zada Khan, Yang Xiang, Mohammed Y Aalsalema, Quratulain Arshada, "The SelectiveForwarding Attack in Sensor Networks: Detections and Countermeasures", I.J. Wireless andMicrowave Technologies, Volume 2, pp 33-44, 2012.