A Review about Enhancing Security Of Cloud Server using Cryptography

Authors

  • Divya Sharma Research Scholar, Department of CSE, PIET Panipat
  • Shakti Arora Assistant professor, Department of CSE, PIET Panipat

Keywords:

Cloud Computing, AES, Security

Abstract

Cloud services are offering flexible & scalable services. But there is always issue of security in traditional cloud based systems. When data is transferred from centrally located server storage to different cloud the technical complexities increases. There is always risk to confidentiality & availability of data prior to selecting a cloud vendor or choosing own cloud & cloud service migration. Cloud services usually have their securityconcerns that must be addressed. In this paper, we have discussed threats to cloud service & data in case of traditional security system. We have also discussed modern security systemto secure data on cloud. Security is provided using multiple layers.

References

Kangchan Lee(2012), “Security Threats in CloudComputingEnvironments”International Journal of Computer Theory and Engineering, Vol. 4, No. 3, June 2012

Mladen A. Vouk (2014),“Cloud Computing Issues, Research & Implementations Cloud”,International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014

Raj Kumar(2015),“Research on Cloud Computing Security Threats using Data Transmission”,International Journal of Advanced Research,Volume 5, Issue 1, January 2015

Peter mill & Tim grance(2011), “The NIST Definition of Cloud Computing”, National Institute of Standards & Technology, GaitherbsburgMD 20899-8930, NIST Special Publication 800-145.

Ellen Messmer,(2011) “New security demands arising for virtualization, cloud computing”, security-demands-arising-for-virtualization—cloud computing.html

Downloads

Published

2017-12-30

How to Cite

Sharma, D., & Arora, S. (2017). A Review about Enhancing Security Of Cloud Server using Cryptography. Innovative Research Thoughts, 3(9), 120–124. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/241