Secured data storage with users validation in cloud environment

Secured data storage with users validation in cloud environment

Naveen Kumar Chunganahalli Gangadharaiah Chandrasekar Chinnasamy 

Bharathiar University, Coimbatore, India

Govt. Arts College, Udumalpet, Tamilnadu, India

Corresponding Author Email: 
cgnaveenkumar11@gmail.com
Page: 
61-72
|
DOI: 
https://doi.org/10.3166/ISI.23.6.61-72
Received: 
| |
Accepted: 
| | Citation

OPEN ACCESS

Abstract: 

Cloud computing is the idea actualized to break up the Daily Computing Problems. Cloud computing is essentially virtual pool of resources and it gives these resources to clients through web interface. Cloud computing is the web based improvement and utilized as a part of PC innovation. The common issue related with Cloud computing is information protection, security, obscurity and unwavering quality and so forth. The paper proposed a new authentication method for validating cloud users. The Paper proposed a new technique for energy consumption reduction in cloud centers so that efficient computing can be done An improved validation component for distinguishing client in cloud condition is likewise proposed. There are three fundamental parts engaged with this structure in particular Cloud User (CU), Trusted Authenticator (TA) and Cloud Service Providers (CSPs). The TA gives secure access to the client by creating the computerized mark. In this paper, the means for confirming the clients are additionally depicted and the power consumption is also reduced.s.

Keywords: 

privacy, encryption, decryption, cloud registering, security, trusted authenticator (TA), energy consumption, energy reduction

1. Introduction
2. Literature survey
3. Crypto cloud computing
4. Proposed framework
5. Results
6. Conclusions
  References

Abdul D. S., Elminaam H. M., Kader A., Hadhoud M. M. (2009). Performance evaluation of symmetric encryption algorithms. International Conference on Parallel, Distributed and Grid Computing, Vol. 8, pp. 58-64. https://doi.org/10.1109/PDGC.2014.7030724

Arora P., Singh A., Tyagi H. (2012). Evaluation and comparison of security issues on cloud computing environment. World of Computer Science and Information Technology Journal, Vol. 2, No. 5, pp. 179-183

Bhisikar P., Sahu A. (2013). Security in data storage and transmission in cloud compituing. International Journal of Advanced Research in Cloud Science and Software Engineering, Vol. 3, No. 3, pp. 410-415.

Chandramohan D, Vengattaraman T, Rajaguru D, Ramachandran B., Dhavachelvan P. (2013). A privacy breach preventing and mitigation methodology for cloud serv ice data storage. IEEE International Advanced Computing Conference. https://doi.org/10.1109/IAdCC.2013.6514199

Fanfara P., Dankova E., Dufala M. (2012). Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication. IEEE 10th Jubilee International Symposium on Applied Machine Intelligence and Informatics, pp. 213-217. https://doi.org/10.1109/SAMI.2012.6208959

Gampala V., Inuganti S., Muppidi S. (2012). Data security in cloud computing with elliptic curve cryptography. International Journal of Soft Computing and Engineering, Vol. 2, pp. 138-141.

Gupta S., Satapathy S. R., Mehta P., Tripathy A. (2012). A secure and searchable data storage in cloud computing. IEEE International Advance Computing Conference, pp. 106-109. https://doi.org/10.1109/IAdCC.2013.6514203

Harjani D., Jethwani M., Keswaney N., Jacob S. (2013). Automated parking management system using license plate recognition. Int. J. Computer Technology & Applications, Vol. 4, No. 5, pp. 741-745.

Hirani S. (2003). Energy consumption of encryption schemes in wireless devices thesis. Master's Thesis, University of Pittsburgh.

Jadeja Y., Modi K. (2012). Cloud co mputing - concepts, architecture and challenges. 012 International Conference on Computing, Electronics and Electrical Technologies, pp. 877-879. https://doi.org/10.1109/ICCEET.2012.6203873

Jansma N., Arrendond B. (2004). Performance comparison of elliptic curve and RSA digital signatures. International Conference on Information and Network Technology, pp. 58-62.

Kaur H., Kaushal K. (2011). Security concerns in cloud computing. High Performance Architecture and Grid Computing: International Conference, pp. 103-112. https://doi.org/10.1007/978-3-642-22577-2_14

Kumar A., Lee B. G., Lee H., Kumari A. (2012). Secure storage and access of data in cloud computing. International Conference on ICT Convergence, pp. 336-339. https://doi.org/10.1109/ICTC.2012.6386854

Leistikow R., Tavangarian D. (2013). Secure picture data partitioning for cloud computing services. International Conference on Advanced Information Networking and Applications Workshops, pp. 668-671. https://doi.org/10.1109/WAINA.2013.157

Nadeem A., Javed M. Y. (2005). A performance comparison of data encryption algorithms. IEEE Information and Communication Technologies, pp. 84-89. https://doi.org/10.1109/ICICT.2005.1598556

Nirmala V., Sivanandhan R. K., Lakshmi R. S. (2013). Data confidentiality and integrity verification using user authenticator scheme in cloud. International Conference on Green High Performance Computing. https://doi.org/10.1109/ICGHPC.2013.6533902

Srikanth B., Kumar H., Rao K. U. M. (2018). A robust approach for WSN localization for underground coal mine monitoring using improved RSSI technique. Mathematical Modelling of Engineering Problems, Vol. 5, No. 3, pp. 225-231. https://doi.org/10.18280/mmep.050314

Sudha M., Monica M. (2012). Enhanced security framework to ensure data security in cloud computing using cryptography. Advances in Computer Science and its Applications, Vol. 1, No. 1, pp. 32-37.

Wang M. M., Zhu G. L., Zhang X. Q. (2018). General survey on massive data encryption. International Conference on Computing Technology and Information Management, pp. 150-155.

Zhang B., Peng C. G., Xu Z. P. (2011). Identity-based distributed cloud storage encryption scheme. International Conference on Reliability, Maintainability and Safety, pp. 610-614. https://doi.org/10.1109/ICRMS.2011.5979341