Research Article | Open Access | Download PDF
Volume 1 | Issue 1 | Year 2011 | Article Id. IJPTT-V1I1P2 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I1P2Implementation of Data Security in Cloud Computing
G. Jai Arul Jose, C. Sajeev
Citation :
G. Jai Arul Jose, C. Sajeev, "Implementation of Data Security in Cloud Computing," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 1, pp. 6-11, 2011. Crossref, https://doi.org/10.14445/22492615/IJPTT-V1I1P2
Abstract
Cloud computing provides people the way to share
distributed resources and services that belong to different organizations or
sites. Since cloud computing share distributed resources via the network in the
open environment, thus it makes security problems important for us to develop
the cloud computing application. On one hand, an individual has full control on
data and processes in his/her computer. On the other hand, we have the cloud
computing wherein, the service and data maintenance is provided by some vendor
which leaves the client/customer unaware of where the processes are running or
where the data is stored. So the client has no control over it. The cloud
computing uses the internet as the communication media. The vendor has to
provide some assurance for security of data in the cloud computing.
Organizations use cloud computing as a service infrastructure, critically like
to examine the security and confidentiality issues for their business critical
insensitive applications. Yet, guaranteeing the security of corporate data in
the "cloud" is difficult, if not impossible, as they provide
different services like Software as a service (SaaS), Platform as a service
(PaaS), and Infrastructure as a service (IaaS). Each service has their own
security issues. Data Protection Application Security Privacy is important
security issues that have to be included in cloud computing. We propose a model
system in which cloud computing system is combined with Cluster Load balancing,
SSL over AES and secure session In this model, some important security
services, including authentication, confidentiality and integrity, are provided
in cloud computing system.
Keywords
Cryptography, Cloud Computing, Public Key, AES
References
[1] S. Singh, ”Different Cloud Computing Standards a Huge Challenge”, The Economic times, 4 June 2009.
[2] J. Urquhart, “The Biggest Cloud computing Issue of 2009is Trust”, C-Net News, 7 Jan 2009.
[3] Wangetai, “Scientific Cloud Computing: Early Definition and Experience”, Proc. 10th International Conference High-Performance Computing and Communications (HPCC 03)
[4] William Stallings, “Cryptography and Network Security Principles and Practices”, Prentice Hall, New Delhi.
[5] National Institute of Standards and Technology. "Request for Candidate Algorithm Nominations for the Advanced Encryption Standard." Federal Register, September 12, 1997.
[6] Nechvatal, J., et al. Report on the Development of the Advanced Encryption Standard. National Institute of Standards and Technology. October 2, 2000.
[7] Needham, R., and Schroeder, M. "Using Encryption for Authentication in Large Networks of Computers." Communications of the ACM, December 1978.
[8] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb`s Journal, March 2001.
[9] Daemen, J., and Rijmen, V. The Design of Rijndael: The Wide Trail Strategy Explained. New York, Springer-Verlag, 2002.