Skip to main content
Top

2018 | OriginalPaper | Chapter

Data Security in Cloud-Based Applications

Authors : Surabhi Pandey, G. N. Purohit, Usha Mujoo Munshi

Published in: Data Science Landscape

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Global business challenges and expeditious growth of Internet services especially in the last decade have driven business organizations to seek an emerging technology for doing business.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Note: AES Specification from: [13]
 
Literature
2.
go back to reference Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering, 15, 2852–2856. Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering, 15, 2852–2856.
3.
go back to reference Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy an enterprise perspective textbook. O’Reilly Media Inc. Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy an enterprise perspective textbook. O’Reilly Media Inc.
4.
go back to reference Katzan, H. (2010). Identity and privacy services. Journal of Service Science, 3(2), 1–13. Katzan, H. (2010). Identity and privacy services. Journal of Service Science, 3(2), 1–13.
5.
go back to reference Katzan, H. (2010). On the privacy of cloud computing. International Journal of Management and Information Systems, 14(2), 1–15. Katzan, H. (2010). On the privacy of cloud computing. International Journal of Management and Information Systems, 14(2), 1–15.
6.
go back to reference Rittinghouse, J., & Ransome, J. (2010). Cloud computing: implementation, management, and security. Boca Raton, FL: CRC Press. Rittinghouse, J., & Ransome, J. (2010). Cloud computing: implementation, management, and security. Boca Raton, FL: CRC Press.
7.
go back to reference Gonzalez, N., Miers, C., Redígolo, F., Simplício, M., Carvalho, T., Näslund, M., & Pourzandi, M. (2011). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications. New York: Springer, online. ISSN: 2192-113X. Gonzalez, N., Miers, C., Redígolo, F., Simplício, M., Carvalho, T., Näslund, M., & Pourzandi, M. (2011). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications. New York: Springer, online. ISSN: 2192-113X.
8.
go back to reference Stallings, W. (2011). Cryptography and network security principles and practice 5e. 2011, 2006. Publishing as Prentince Hall. ISBN 10: 0-13-609704-9, ISBN 13: 978-0-13-609704-4. Stallings, W. (2011). Cryptography and network security principles and practice 5e. 2011, 2006. Publishing as Prentince Hall. ISBN 10: 0-13-609704-9, ISBN 13: 978-0-13-609704-4.
9.
go back to reference Pitchaiah, M., & Daniel, P. (2012). Implementation of advanced encryption standard algorithm. Research paper published International Journal of Scientific and Engineering Research, 3(3), March 1, 2012. ISSN 2229-5518. Pitchaiah, M., & Daniel, P. (2012). Implementation of advanced encryption standard algorithm. Research paper published International Journal of Scientific and Engineering Research, 3(3), March 1, 2012. ISSN 2229-5518.
10.
go back to reference Foruzan Behrouz, A., & Mukhopadhyay, D. (2010). Cryptography and network security 2e. Book published by Tata Mac Graw Hill Education Pvt.ltd. ISBN 13: 978-0-07-070208-0. ISBN 10: 0-07-070208-X. Foruzan Behrouz, A., & Mukhopadhyay, D. (2010). Cryptography and network security 2e. Book published by Tata Mac Graw Hill Education Pvt.ltd. ISBN 13: 978-0-07-070208-0. ISBN 10: 0-07-070208-X.
11.
go back to reference Daemen, J., & Rijmen, V. (1820). The block cipher Rijndael smart card research and applications, LNCS 1820 (pp. 288–296). New York: Springer. Daemen, J., & Rijmen, V. (1820). The block cipher Rijndael smart card research and applications, LNCS 1820 (pp. 288–296). New York: Springer.
12.
go back to reference Habib, S. M., Hauke, S., Ries, S., & Muhlhauser, M. (2012). Trust as a facilitator in cloud computing: a survey. Journal of cloud Computing. New York: Springer, online. ISSN: 2192-113X. Habib, S. M., Hauke, S., Ries, S., & Muhlhauser, M. (2012). Trust as a facilitator in cloud computing: a survey. Journal of cloud Computing. New York: Springer, online. ISSN: 2192-113X.
13.
go back to reference Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing. Published: Computers and Electrical Engineering on science direct, 39(1), 47–54. January 2013. Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing. Published: Computers and Electrical Engineering on science direct, 39(1), 47–54. January 2013.
14.
go back to reference Specification for the Advanced Encryption Standard (AES),‖ Federal Information Processing Standards Publication 197, November 2001. Specification for the Advanced Encryption Standard (AES),‖ Federal Information Processing Standards Publication 197, November 2001.
Metadata
Title
Data SecurityData Security in Cloud-Based ApplicationsCloud-Based Applications
Authors
Surabhi Pandey
G. N. Purohit
Usha Mujoo Munshi
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7515-5_24

Premium Partner