Data Protection for Users in Cloud Computing
Author(s): AHUBELE, Betty; UGBARI, Augustine
Author(s) keywords: cloud computing, data protection, encryption techniques
Reference keywords: algorithm, cloud security, data privacy
Abstract:
Information technology might have simplified the way we do business, but it has also brought challenges that never before existed. Accessing data from public repositories leads to multiple difficulties. It is also necessary for the data to be available in an accurate, complete and timely manner. This paper will discuss the challenges and breaches of data protection for users in cloud computing and also explores various techniques used to address these issues.
References:
[1]. Alexa Huth and James Cebula “The Basics of Cloud Computing”, United States Computer Emergency Readiness Team. (2011)
[2]. Garima Saini, Gurgaon Naveen Sharma,”Triple Security of Data in Cloud Computing“, Garima Saini et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol.5 (4) , 2014.
[3]. D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud,“Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA Volume 8, 2009.
[4]. Qi. Zhang ·Lu. Cheng, Raouf Boutaba, “Cloud computing: state-Of-the-art and research Challenges”, The Brazilian Computer Society, April 2010.
[5]. Foster, I. T., Zhao, Y., Raicu, I., & Lu, S. (2009). Cloud Computing and Grid Computing 360- Degree Compared CoRR. abs/0901.0131.
[6]. Srinivasa rao v, Nageswara rao n k, E Kusuma kumari, “Cloud Computing: An Overview”, Journal of Theoretical and Applied Information Technology.
[7]. Rachna Jain and Ankur Aggarwal, “Cloud Computing Security Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering. January (2014) Vol. 4, Issue 1.
[8]. Manzoor Hussain Dar, Pardeep Mittal and Vinod Kumar, “A Comparative Study of Cryptographic Algorithms”, International Journal of Computer Science and Network. June (2014) ISSN(Online): 2277- 5420, Volume 3, Issue 3.
[9]. Gartener: Seven cloud-computing security risks. InfoWorld.2008-07-02, http://www.infoworld.com/d/security-central/gartener-seven-cloud-computing-security-risks-853.
[10]. G. Devi and M. Pramod Kumar, “Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish Algorithm”, International Journal of Computer Trends and Technology. (2012) Vol. 3 Issue 4, ISSN: 2231-2803, pp.592-596.
[11]. Mr. Gurjeevan Singh, Mr. Ashwani Singla and Mr. K S Sandha, “Cryptography Algorithm Comparison For Security Enhancement In Wireless Intrusion Detection System”, International Journal of Multidisciplinary Research, Vol. 1, Issue 4, August 2011.
[12]. Sandipan Basu, “International Data Encryption Algorithm (IDEA) - A Typical Illustration”, Journal of Global Research in Computer Science. July (2011) ISSN: 2229-371X, Vol. 2, Issue 7.
[13]. Ayan Mahalanobis, “Diffie-Hellman Key Exchange Protocol”, Its Gernalization and Nilpotent Groups. August (2005).
[14]. Maha TEBAA, Said EL HAJJI and Abdellatif EL GHAJI, “Homomorphic Encryption Applied to the Cloud Computing Security”, World Congress on Engineering. July 4 (2012) Vol. 1, London U.K. ISBN: 978-988-19251-3-8, ISSN: 2078-0958 (Print); ISSN: 2078-0966 (online).
[15]. B. Persis Urbana Ivy, Purshotam Mandiwa and Mukesh Kumar, “A Modified RSA Cryptosystem Based on ‘n’ Prime Number”, International Journal of Engineering and Computer Science, Nov (2012), ISSN: 2319-7242, Volume 1 Issue 2.
[16]. Shakeeba S. Khan and Prof. R.R. Tuteja, “Security in Cloud Computin Using Cryptographic Algorithms”, International Journal of Innovative Research in Computer and Communication Engineering. January 1, (2015) ISSN (online): 2320-9801, (Print): 2320-9798, Vol. 3.
[17]. Ohri, A. (2020). Elliptic Curve Cryptography: An Overview. Retrieved 27/01/2022, www.jigsawacademy.com.
[18]. Muyinnda, N. (2014). Elliptic Curve Crptography. Mekere University. Retrieved 28/01/2022. www.researchgate.net.
[19]. Gahan, A. (2019). An Empirical Study of Security Issues In Encryption Techniques. International Journal of Applied Engineering Research. 14(5). 1049-1061.
Article Title: Data Protection for Users in Cloud Computing
Author(s): AHUBELE, Betty; UGBARI, Augustine
Date of Publication: 2022-06-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2022.01.04
Issue: Volume 11, Issue 1, Year 2022
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 31-40 (10 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.