AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

نویسنده

  • S. Monikandan
چکیده

Cloud dominates the IT enterprises by way of its computing services. One of the services provided by the cloud is data storage. Cloud storage mainly supports Small and Medium scale Enterprises (SMEs) by reducing their capital investments and maintenance of storage servers. Most of the SMEs are outsourcing their data to cloud storage. Enterprises’ data that are forwarded to the cloud have to be kept in the public cloud storage. Safety and security are the top most issues in cloud storage. The confidentiality parameter provides data storage security. This paper proposes a security service algorithm named AROcrypt to ensure the security of data stored in cloud storage. It also describes Security as a Service (SEaaS) in the cloud environment. Simulation was conducted using a security analysis tool with existing techniques. The proposed technique provides better performance and good security when compared with existing techniques. KeywordCloud Computing, Data Security, Cloud Storage, Encryption, Confidentiality, SEaaS

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage

With the vast development in cloud computing model, various organizations and individuals often deploy the cloud without reviewing the security policies and procedures which can cause great risk in their business. Securing data in cloud storage becomes a challenging task not only for the cloud user but also to the Cloud Service Provider (CSP). Storing secret data in unencrypted form is suscepti...

متن کامل

A Simple Technique for Securing Data at Rest Stored in a Computing Cloud

“Cloud Computing” offers many potential benefits, including cost savings, the ability to deploy applications and services quickly, and the ease of scaling those application and services once they are deployed. A key barrier for enterprise adoption is the confidentiality of data stored on Cloud Computing Infrastructure. Our simple technique implemented with Open Source software solves this probl...

متن کامل

Secure Relational Data Access in The Cloud

With the success of the cloud computing paradigm, data security in the cloud remains a big concern and even an obstacle that prohibits the adoption of enterprise usage of the cloud. Although encryption can provide confidentiality for enterprise data, most current data access methods on encrypted data either sacrifice query efficiency for data confidentiality, or trade off partial confidentialit...

متن کامل

De-duplication of Data in Cloud

Rendering efficient storage and security for all data is very important for cloud computing. Securing and privacy preserving of data is of high priority when it comes to cloud storage. Therefore to provide efficient storage for cloud data owners and render high security for data this paper proposes Cloud Computing Secure Framework (CCSF). Thus CCSF consists of four segments: 1) Identity Managem...

متن کامل

Securing Data Provenance in the Cloud

Cloud storage offers the flexibility of accessing data from anywhere at any time while providing economical benefits and scalability. However, cloud stores lack the ability to manage data provenance. Data provenance describes how a particular piece of data has been produced. It is vital for a post-incident investigation, widely used in healthcare, scientific collaboration, forensic analysis and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015