Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 248))

Abstract

Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources. It implies a service oriented architecture type (SOA), reduced information technology overhead for the end-user, great flexibility model, reduced total cost of ownership, on-demand service providing structure and many other things. One of the main concerns of customers is Cloud security and the threat of the unknown. The lack of physical access to servers constitutes a completely new and disruptive challenge for investigators. The Users are store, transfer or exchange their data using public cloud. This paper represents the encryption method for public cloud and also the cloud service provider’s verification mechanism using the third party auditors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Tripathi, A., Yadav, P.: Enhancing Security of Cloud Computing using Elliptic Curve Cryptography. International Journal of Computer Applications (0975 - 8887) 57(1), 26–30 (2012)

    Google Scholar 

  2. El-Khameesy, N., Rahman, H.A.: A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems. Journal of Emerging Trends in Computing and Information Sciences 3(6), 970–974 (2012)

    Google Scholar 

  3. Nafi, K.W., Kar, T.S., Hoque, S.A., Hashem, M.M.A.: A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture (IJACSA) International Journal of Advanced Computer Science and Applications 3(10), 181–186 (2012)

    Google Scholar 

  4. Govinda, K., Gurunathaprasad, V., Sathishkumar, H.: Third Party Auditing for Secure Datastorage in Cloud through Digital Signature using RSA. International Journal of Advanced Scientific and Technical Research 4(2), 525–530 (2012) ISSN 2249-9954

    Google Scholar 

  5. Kaur, M., Mahajan, M.: Implementing Various Encryption Algorithms to Enhance the Data Security of Cloud in Cloud Computing. VSRD International Journal of Computer Science & Information Technology 2(10), 831–835 (2012)

    Google Scholar 

  6. Kaur, S.: Cryptography and Encryption In Cloud Computing. VSRD International Journal of Computer Science & Information Technology (VSRD-IJCSIT) 2(3), 242–249 (2012); Kaur, A., Bhardwaj, M.: Hybrid Encryption tor Cloud Database Security. International Journal OF Engineering Science & Advanced Technology 2(3), 737–741 (2012)

    Google Scholar 

  7. Sudha, M., Monica, M.: Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Data Secuity. Advances in Computer Science and its Applications 1(1), 32–37 (2012)

    Google Scholar 

  8. Gampala, V., Inuganti, S., Muppidi, S.: Data Security in Cloud Computing with Elliptic Curve Cryptography. International Journal of Soft Computing and Engineering (IJSCE) 2(3), 138–141 (2012) ISSN: 2231-2307

    Google Scholar 

  9. Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic Encryption Applied to the Cloud Computing Security. In: Proceedings of the World Congress on Engineering (WCE 2012), London, U.K., July 4-6, vol. I, pp. 536–539 (2012)

    Google Scholar 

  10. Bhagat, A., Sahu, R.K.: Using Third Party Auditor for Cloud Data Security: A Review. International Journal of Advanced Research in Computer Science and Software Engineering 3(3), 34–39 (2013)

    Google Scholar 

  11. Saravanan, N., Mahendiran, A., Venkata Subramanian, N., Sairam, N.: An Implementation of RSA Algorithm in Google Cloud using Cloud SQL. Research Journal of Applied Sciences, Engineering and Technology 4(19), 3574–3579 (2012)

    Google Scholar 

  12. Bhosale, P., Deshmukh, P., Dimbar, G., Deshpande, A.: Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption. International Journal of Engineering Research & Technology (IJERT) 1(8), 1–8 (2012)

    Google Scholar 

  13. Radhika, G., Satyanarayana, K.V.V., Tejaswi, A.: Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms. International Journal of Computer Trends and Technology 4(3), 375–380 (2013)

    Google Scholar 

  14. Marwaha, M., Bedi, R.: Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing. IJCSI International Journal of Computer Science Issues 10(1(1)), 367–370 (2013)

    Google Scholar 

  15. Nigoti, R., Jhuria, M., Singh, S.: A Survey of Cryptographic Algorithms for Cloud Computing. International Journal of Emerging Technologies in Computational and Applied Sciences 4(2), 141–146 (2013)

    Google Scholar 

  16. Mishra, A., Gupta, D.K., Sahoo, G.: BIT Mesra Ranchi, Jharkhand. The Secure Data Storage in Cloud Computing Using Hadamard Matrix. International Journal of Engineering Science and Innovative Technology (IJESIT) 2(2), 389–395 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Boopathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Boopathy, D., Sundaresan, M. (2014). Securing Public Data Storage in Cloud Environment. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Advances in Intelligent Systems and Computing, vol 248. Springer, Cham. https://doi.org/10.1007/978-3-319-03107-1_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03107-1_61

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03106-4

  • Online ISBN: 978-3-319-03107-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics