Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Cloud Data Storage Security Techniques and Security Issues on Mobile device

Print
PDF
IJCA Special Issue on Recent Trends in Information Security
© 2014 by IJCA Journal
RTINFOSEC
Year of Publication: 2014
Authors:
Seema Banduji Bhalekar
V. M. Thakare
U. S. Junghare

Seema Banduji Bhalekar, V M Thakare and U S Junghare. Article: Cloud Data Storage Security Techniques and Security Issues on Mobile device. IJCA Special Issue on Recent Trends in Information Security RTINFOSEC:9-13, February 2014. Full text available. BibTeX

@article{key:article,
	author = {Seema Banduji Bhalekar and V. M. Thakare and U. S. Junghare},
	title = {Article: Cloud Data Storage Security Techniques and Security Issues on Mobile device},
	journal = {IJCA Special Issue on Recent Trends in Information Security},
	year = {2014},
	volume = {RTINFOSEC},
	pages = {9-13},
	month = {February},
	note = {Full text available}
}

Abstract

Cloud computing is a revolution which has made world of internet more like a place of dynamic storage. It has made a lot of changes in infrastructure side. It has deeply impacted the software industry. Many companies and institution are used cloud computing technology but major security issues are how the data keep secured and safe. This paper discussed the different cloud data storage security techniques and analyzes the issue of the data security.

References

  • V. Guha and Dr M. Shrivastav," Review of Information Authentication in Mobile Cloud over SaaS and PaaS Layer", International Journal of Advanced Computer Research ISSN (print):2249-7277 ISSN (online):2277-7970, Volume-3, Number-1, Issue -9, March -2013.
  • S. Patel, "A Survey of Mobile Cloud Computing: Architecture, Existing work and Challenges", International Journal of Advanced Research in Computer Science and Software Engineering, Volume-3, Issue -6, June -2013.
  • R. Vasu,"Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing", IJCTA, Sept-Oct 2011.
  • A. S. Shimpi and R. P. Chander," Secure Framework in Data processing for Mobile Cloud Computing", International Journal of Computer Science and Informatics ISSN (print):2231-5292, Volume-2, Issue-3, 2012
  • L. Ma and J. Sum and Y. Li,"Comparing General paradigm on Data Secrecy Protection for Outsourced file in Mobile Cloud Computing", Journal of Networks, Volume -7, No -9, Sept -2012
  • P. Garg and Dr V. Sharma, "Secure Data Storage in Mobile Cloud Computing", International Journal of Scientific and Engineering Research, Volume-4, Issue-4, April 2013
  • Z. Zhou and D. Huang," Efficient and Secure Data Storage operation for Mobile Cloud Computing", 2012 8th International Conference on Network and Service Management (CNSM 2012)
  • Mr. Y. Graham and Mr. P. Shende,"Mobile Data Security on Cloud Computing Using SAAS",International Journal of Advanced Research in Computer Engineering and Technology , Volume -2, Issue-11, November 2013
  • 9)D. Purushothaman and Dr. S. Abburu,"An Approach for Data Storage Security in Cloud Computing", copyright(c)2012 International Journal of Computer Science Issue . All right reserved
  • V. G. R. and R. M. Reddy,"Data Security in Cloud based on Trusted Computing Environment", International Journal of Soft Computing and Engineering, ISSN: 2231-2301, Volume-3, Isssue-1, March -2013.
  • V. Gampala, S. Inuganti and S. Muppidi," Data Security in Cloud Computing with Elliptic Curve Cryptography", International Journal of Soft Computing and Engineering, ISSN: 2231-2307, Volume-2, Issue-3, July -2012.
  • K. Singh, I. Kharbanda and N. Kaur," Security Issue occurs in Cloud Computing and their solution", Karmjit singh et al. / International Journal on Computer Science and Engineering, ISSN: 0975-3397, Volume-4 No. 05, May 2012
  • K. Murugesan and S. Sudheendran, "Ensuring User Security and data integrity in multicloud", International Journal of Soft Computing and Engineering, ISSN: 2231-2307, Volume-3, Issue-2, May -2013.
  • A. C. Donald, S. A. Oli and L. Arockiam,"Mobile Cloud Security Issue and Challenge: A Perspective", International Journal of Engineering and Innovative Technology, Volume-3, Issue -1, July -2013