Skip to main content
Top

2018 | OriginalPaper | Chapter

Data Security and Encryption Technique for Cloud Storage

Authors : Sunil Kumar, Jayant Shekhar, Jatinder Paul Singh

Published in: Cyber Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the last few years, we have seen that cloud computing model has been developed as a promising business model of the fastest growing IT sector. Most of the IT companies, organizations, and educational institutes are now realizing that they can put on fast access to daily used computer applications and significantly boost up with infrastructure resources by simply moving to the cloud, at the very negligible cost. But they are also worried about privacy and security of their data, which is placed on the server of service providers. In this paper, we proposed a data security and encryption technique to provide privacy and security to our dynamic cloud data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Naone E (2009) Technology overview, conjuring clouds. MIT Technol Rev Naone E (2009) Technology overview, conjuring clouds. MIT Technol Rev
2.
go back to reference Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Network Comput Appl 34:1–11CrossRef Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Network Comput Appl 34:1–11CrossRef
3.
go back to reference Merlin Shirly T, Johnson M (2014) Improved security measures for data in key exchanges in cloud environment. Int J Res Comput Appl Robot 2(3):153–158 (ISSN:2320-7345) Merlin Shirly T, Johnson M (2014) Improved security measures for data in key exchanges in cloud environment. Int J Res Comput Appl Robot 2(3):153–158 (ISSN:2320-7345)
4.
go back to reference Singh K et al (2010) Implementation of elliptic curve digital signature algorithm. Int J Comput Appl (IJCA) 2(2):21–27 (ISSN: 0975–8887) Singh K et al (2010) Implementation of elliptic curve digital signature algorithm. Int J Comput Appl (IJCA) 2(2):21–27 (ISSN: 0975–8887)
5.
go back to reference Tripathi A, Parul Y (2012) Enhancing security of cloud computing using elliptic curve cryptography. Int J Comput Appl 1 Tripathi A, Parul Y (2012) Enhancing security of cloud computing using elliptic curve cryptography. Int J Comput Appl 1
7.
go back to reference Gomathisankaran M et al (2011) HORNS: a homomorphic encryption scheme for cloud computing using residue number system. In: 45th annual conference on information sciences and systems (CISS), pp 1–5. Print ISBN: 978-1-4244-9846-8 Gomathisankaran M et al (2011) HORNS: a homomorphic encryption scheme for cloud computing using residue number system. In: 45th annual conference on information sciences and systems (CISS), pp 1–5. Print ISBN: 978-1-4244-9846-8
8.
go back to reference Singh JP, Kumar S, Dr. Mamta (2015) Authentication and encryption in cloud computing. In: International conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM), Chennai, May 2015, p 230. ISBN: 978-1-4-4799-9854-8 Singh JP, Kumar S, Dr. Mamta (2015) Authentication and encryption in cloud computing. In: International conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM), Chennai, May 2015, p 230. ISBN: 978-1-4-4799-9854-8
Metadata
Title
Data Security and Encryption Technique for Cloud Storage
Authors
Sunil Kumar
Jayant Shekhar
Jatinder Paul Singh
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_19

Premium Partner