REVIEW ON CLOUD COMPUTING
IT Skills Show & International Conference on Advancements in Computing Resources, (SSICACR-2017) 15 and 16 February 2017, Alagappa University, Karaikudi, Tamil Nadu, India. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Abstract
Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.
References
1. https://en.wikipedia.org/wiki/IDbased_encryption
2. Goh E-J. Technical Report 2003/216, IACR ePrint Cryptography Archive, 2003. Available from: https://eprint.iacr.org/2003/216.
3. https://www.ijcsit.com/docs/Volume%206/v ol6issue02/ijcsit2015060233.pdf
4. https://en.wikipedia.org/wiki/Attributebased_encryption
5. Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing. Proceedings of Cryptography 2001, LNCS, Springer-Verlag. 2001; 2139:213–29.
6. Fontaine C, Galand F. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007. 2007 Jan; 1–15.
7. Shamir A. Identity-Based Cryptosystems and Signature Schemes. In Proceedings of Cryptography 1984, LNCS. SpringerVerlag. 1985; 196:47–53.
Keywords
Cloud computing, security threat, multitenant behaveour, standards, cryptographic tecniques, Cloud storage system, Encryption technique and policies.