Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Concern towards Data Security in Cloud Computing

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 114 - Number 11
Year of Publication: 2015
Authors:
Maninder Singh Bajwa
Himani
10.5120/20022-2049

Maninder Singh Bajwa and Himani. Article: A Concern towards Data Security in Cloud Computing. International Journal of Computer Applications 114(11):17-19, March 2015. Full text available. BibTeX

@article{key:article,
	author = {Maninder Singh Bajwa and Himani},
	title = {Article: A Concern towards Data Security in Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {114},
	number = {11},
	pages = {17-19},
	month = {March},
	note = {Full text available}
}

Abstract

Cloud computing is one of the emerging innovative trend of IT technology today. This trend has got remarkable advancement in computing world. Although cloud is boon to computing world but its adoption in IT sector is lack behind due to many issues. In this paper we focus on most prevailing issues related to data security of cloud. The main objective is related to data security which may include the concepts like confidentiality, integrity, data leakage, availability, data access.

References

  • Aws Naser Jaber, Mazlina Binti Abdul Majid, Mohamad Fadli Bin Zolkipli and Nusrat Ullah Khan, "A Study in Data Security in Cloud Computing", 2014 IEEE.
  • Ayad F. Barsoum et al "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015
  • Cindhamani. J et al "An enhanced data security and trust management enabled framework for cloud computing systems", 5th ICCCNT – 2014.
  • Cristina Basescu et al, "Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies". IEEE 2011 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, ROME.
  • Dharmendra S. Raghuwanshi et. al "MS2: Practical Data Privacy and Security Framework for Data at Rest in Cloud", 2014 IEEE.
  • Jeong-Min Do et. al, "Attribute based Proxy Re-Encryption for Data Confidentiality in Cloud Computing Environments". 1ST IEEE ACIS/JNU INT. CONFERENCE ON COMPUTERS, NETWORKS, SYSTEMS, AND INDUSTRIAL ENGINEERING (CNSI 2011), KOREA.
  • Jingwei Li et. al. "Secure Auditing and Deduplicating Data in Cloud", 2015 IEEE TRANSACTIONS ON COMPUTERS.
  • Louai A. Maghrabi, "The Threats of Data Security over the Cloud as * Perceived by Experts and University Students", 2014 IEEE.
  • Mazhar Ali et al "SeDaSC: Secure Data Sharing in Clouds", IEEE SYSTEMS JOURNAL 2015.
  • Rashmi, Dr. G. Sahoo and Dr. S. Mehfuz, "Securing Software as a Service Model of Cloud Computing: Issues and Solutions", INTERNATIONAL JOURNAL ON CLOUD COMPUTING: SERVICES AND ARCHITECTURE (IJCCSA), VOL. 3, NO. 4, August 2013.
  • Taeho Jung et. al "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 1, JANUARY 2015.
  • Tao Jiang, Xiaofeng Chen, and Jianfeng Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation," IEEE 2015.