Securing Public Data Storage in Cloud Environment

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 248)


Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources. It implies a service oriented architecture type (SOA), reduced information technology overhead for the end-user, great flexibility model, reduced total cost of ownership, on-demand service providing structure and many other things. One of the main concerns of customers is Cloud security and the threat of the unknown. The lack of physical access to servers constitutes a completely new and disruptive challenge for investigators. The Users are store, transfer or exchange their data using public cloud. This paper represents the encryption method for public cloud and also the cloud service provider’s verification mechanism using the third party auditors.


Secured Data Storage Public Cloud Service Provider Cloud Service Provider Cloud Encryption Cloud Decryption Third Party Auditor 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Tripathi, A., Yadav, P.: Enhancing Security of Cloud Computing using Elliptic Curve Cryptography. International Journal of Computer Applications (0975 - 8887) 57(1), 26–30 (2012)Google Scholar
  2. 2.
    El-Khameesy, N., Rahman, H.A.: A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems. Journal of Emerging Trends in Computing and Information Sciences 3(6), 970–974 (2012)Google Scholar
  3. 3.
    Nafi, K.W., Kar, T.S., Hoque, S.A., Hashem, M.M.A.: A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture (IJACSA) International Journal of Advanced Computer Science and Applications 3(10), 181–186 (2012)Google Scholar
  4. 4.
    Govinda, K., Gurunathaprasad, V., Sathishkumar, H.: Third Party Auditing for Secure Datastorage in Cloud through Digital Signature using RSA. International Journal of Advanced Scientific and Technical Research 4(2), 525–530 (2012) ISSN 2249-9954Google Scholar
  5. 5.
    Kaur, M., Mahajan, M.: Implementing Various Encryption Algorithms to Enhance the Data Security of Cloud in Cloud Computing. VSRD International Journal of Computer Science & Information Technology 2(10), 831–835 (2012)Google Scholar
  6. 6.
    Kaur, S.: Cryptography and Encryption In Cloud Computing. VSRD International Journal of Computer Science & Information Technology (VSRD-IJCSIT) 2(3), 242–249 (2012); Kaur, A., Bhardwaj, M.: Hybrid Encryption tor Cloud Database Security. International Journal OF Engineering Science & Advanced Technology 2(3), 737–741 (2012)Google Scholar
  7. 7.
    Sudha, M., Monica, M.: Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Data Secuity. Advances in Computer Science and its Applications 1(1), 32–37 (2012)Google Scholar
  8. 8.
    Gampala, V., Inuganti, S., Muppidi, S.: Data Security in Cloud Computing with Elliptic Curve Cryptography. International Journal of Soft Computing and Engineering (IJSCE) 2(3), 138–141 (2012) ISSN: 2231-2307Google Scholar
  9. 9.
    Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic Encryption Applied to the Cloud Computing Security. In: Proceedings of the World Congress on Engineering (WCE 2012), London, U.K., July 4-6, vol. I, pp. 536–539 (2012) Google Scholar
  10. 10.
    Bhagat, A., Sahu, R.K.: Using Third Party Auditor for Cloud Data Security: A Review. International Journal of Advanced Research in Computer Science and Software Engineering 3(3), 34–39 (2013)Google Scholar
  11. 11.
    Saravanan, N., Mahendiran, A., Venkata Subramanian, N., Sairam, N.: An Implementation of RSA Algorithm in Google Cloud using Cloud SQL. Research Journal of Applied Sciences, Engineering and Technology 4(19), 3574–3579 (2012)Google Scholar
  12. 12.
    Bhosale, P., Deshmukh, P., Dimbar, G., Deshpande, A.: Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption. International Journal of Engineering Research & Technology (IJERT) 1(8), 1–8 (2012)Google Scholar
  13. 13.
    Radhika, G., Satyanarayana, K.V.V., Tejaswi, A.: Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms. International Journal of Computer Trends and Technology 4(3), 375–380 (2013)Google Scholar
  14. 14.
    Marwaha, M., Bedi, R.: Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing. IJCSI International Journal of Computer Science Issues 10(1(1)), 367–370 (2013)Google Scholar
  15. 15.
    Nigoti, R., Jhuria, M., Singh, S.: A Survey of Cryptographic Algorithms for Cloud Computing. International Journal of Emerging Technologies in Computational and Applied Sciences 4(2), 141–146 (2013)Google Scholar
  16. 16.
    Mishra, A., Gupta, D.K., Sahoo, G.: BIT Mesra Ranchi, Jharkhand. The Secure Data Storage in Cloud Computing Using Hadamard Matrix. International Journal of Engineering Science and Innovative Technology (IJESIT) 2(2), 389–395 (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Information TechnologyBharathiar UniversityCoimbatoreIndia

Personalised recommendations