Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 114 - Number 7
Year of Publication: 2015
Authors:
Rimmy Chuchra
R. K Seth
10.5120/19989-1619

Rimmy Chuchra and R k Seth. Article: Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing. International Journal of Computer Applications 114(7):12-17, March 2015. Full text available. BibTeX

@article{key:article,
	author = {Rimmy Chuchra and R.k Seth},
	title = {Article: Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {114},
	number = {7},
	pages = {12-17},
	month = {March},
	note = {Full text available}
}

Abstract

Security during data transmission in cloud computing using TBDSA (Token Based Data Security Algorithm) along with its implementation is presented in this paper. The auto-generated token based certificate activation approach with SSL (Secure Socket Layer) provides the appropriate collaboration between the cloud client and the cloud service provider, so that user may become confident during data transfer by utilizing various cloud applications and services. The chances of attacks may be reduced by implementing this TBDSA. This designed algorithm takes less time to execute and increases the performance of the system.

References

  • Rashminigoti and Dr. Shailendra singh, 2013. A survey of cryptographic algorithm for cloud computing, International journal of emerging trends and computer application systems.
  • Leenakhanna and Dr. AmantJaiswal March-2013, Cloud computing: Security issues and description of encryption based algorithm to overcome them, International journal of advanced research in computer science and software engg.
  • Manpreetkaur and Rajbir Singh May-2013, implementing encryption algorithm to enhance data security in cloud computing, International journal of computer application.
  • M. Vijayapriya Sept-2013, Security algorithm in cloud computing: Overview, International journal of computer science and emerging technology.
  • Dr. M. M andA. Hasham 2012. A new user authentication file encryption & distributed server based cloud computing security architecture, International journal of advanced computer science and applications.
  • T. Sivasakthi and Dr. Prabakarn Feb-2014. Applying digital signature with encryption algorithm of user authentication for data security in cloud computing, International journal of innovative research in computer and communication engg.
  • Chimerebarron and huimingYu WCE-2013. Cloud computing security case studies and research, proceeding of the world congress on engg,London, U. K.
  • N. Saravanan andA. Mahendiran 2012. Implementation of RSA algorithm in google cloud using SQL cloud, Research journal of applied sciences, Engg. & technology.
  • Nehajain and gurpreetkaur 2012. Implementing DES algorithm in cloud for data security, International journal of computer science and information technology.
  • Sanjoli single and jasmeetsingh 2013. Implementing cloud data security by encryption using rijndaelalgorithm,Global journal of computer science and technology cloud and distributed.
  • Prakash G. L and Dr. Manishparteek April-2013. Data encryption and decryption algorithm using key rotations for data security in cloud computing, International journal of engg. And computer science.
  • Kevin Hamle, Murat kantarcioglu, Latifur khan and bhavanithuraisingham April-June-2010. Security issues for cloud computing, International journal of information security and privacy.
  • Anjanachaudhry and ravinderthakur Dec-2013. A review: Data security approach in cloud computing by using RSA algorithm, International journal of advance research in computer science and management studies.
  • V. S Rajudue,. N. Prasanthi and A. Jagadeesh Dec-2013. A study of algorithm used to secure data processing in cloud computing, International journal of computer science and technology.
  • Kashifmunir and Dr. SellapanPalaniappan, April-2013, Framework for cloud computing, International journal on cloud computing: Services and architecture.
  • P. Shubshri and A. Padmapriya July-2013. Implementation of reverse Caesar cipher algorithm for cloud computing, International journal of computer trends and technology.
  • RimmyChuchra Oct-2012. Data security in cloud computing, International Journal of societal applications of computer science.
  • R. K Seth and RimmyChuchra March-April-2014. TBDSA- A new data security algorithm in cloud computing, International journal of computer science and information technology.