CFP last date
16 December 2024
Reseach Article

A Strongly Trusted Integrity Preservance based Security Framework for Critical Information Storage over Cloud Platform

by Shweta Sharma
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 6
Year of Publication: 2016
Authors: Shweta Sharma
10.5120/ijais2016451612

Shweta Sharma . A Strongly Trusted Integrity Preservance based Security Framework for Critical Information Storage over Cloud Platform. International Journal of Applied Information Systems. 11, 6 ( Nov 2016), 3-7. DOI=10.5120/ijais2016451612

@article{ 10.5120/ijais2016451612,
author = { Shweta Sharma },
title = { A Strongly Trusted Integrity Preservance based Security Framework for Critical Information Storage over Cloud Platform },
journal = { International Journal of Applied Information Systems },
issue_date = { Nov 2016 },
volume = { 11 },
number = { 6 },
month = { Nov },
year = { 2016 },
issn = { 2249-0868 },
pages = { 3-7 },
numpages = {9},
url = { https://www.ijais.org/archives/volume11/number6/944-2016451612/ },
doi = { 10.5120/ijais2016451612 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:04:16.490665+05:30
%A Shweta Sharma
%T A Strongly Trusted Integrity Preservance based Security Framework for Critical Information Storage over Cloud Platform
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 11
%N 6
%P 3-7
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

During last few years, the demand of cloud computing has immensely arisen among the Corporate/Business organizations. The cloud computing concept brings exclusive monetary benefits to the corporate houses through its pay-as per use facility. The incurred cost only lies in the consumption of hardware and software resources for any particular available business applications[1].For any particular project, all the web applications are deployed on available physical servers ,dispersed throughout the countries ,connected through cloud service providers. This mega scale growth in the adoption of cloud platform leads to extreme revenue benefits to the involved parties. But at the same time, information security also requires to be well enveloped in the cloud environment [2].In this research work, we have incorporated various cryptographic algorithms to improve the authentication module such as Challenge response Authentication protocol and file data storage using suitable and efficient Digital Signature Standard scheme along with effective encryption schemes such as AES as well. The proposed framework represents proper client –server authentication and secured & trusted architecture for stored information on cloud server. We have done research work to alleviate the security of stored information with in the cloud and also to protect it from any outside attack during information exchange between client and server.

References
  1. GA Solanki, Welcome to the Future of Computing: Cloud Computing and Legal Issues, International Journal of Scientific & Technology Research 2012, vol1, issue 9.
  2. Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza Carvalho, Mats Naslund, Makan Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing, Gonzalez et al. Journal of Cloud Computing: Advances, Systems and Applications 2012.
  3. Lijun Mei, W .K .Chan, T .H .Tse, A Tale of Clouds: Paradigm comparisons and some thoughts on research issues, 2008 IEEE Asia-Pacific Services Computing Conference.
  4. Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit, Cloud security Issues 2009, IEEE.
  5. M. Sudha, M. Monika, Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography, Advances in Computer Science and its Applications 32 Vol. 1, No. 1, March 2012, Copyright © World Science Publisher, United States. www.worldsciencepublisher.org.
  6. Sanchika Gupta, Anjali Sardana, Padam Kumar, A light Weight Centralized File Monitoring Approach for Securing Files in Cloud Environment ,The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) ,IEEE 2012.
  7. Sanchika Gupta, Anjali Sardana, Padam Kumar , Ajith Abraham, A secure and light weight approach for critical data security in cloud, 2012 Fourth International Conference on Computational Aspects of Social Networks (CA Sons).
  8. Forouzan, Cryptography and Network Security, TMH 2012.
  9. S. Patil, A. Kashyap, G. Sivathanu and E. Zadok, I3FS: An in-kernel integrity checker and intrusion detection file system.
  10. Q. Nguyen Anh and T. Yoshiyasu, A novel approach for a file-system integrity monitor tool of Xen virtual machine, Book A novel approach for a file-system integrity monitor tool of Xen virtual machine, Series A novel approach for a file-system integrity monitor tool of Xen virtual machine, ed.,Editor ed.ls\eds., ACM, 2007.
  11. R.K.L. Ko, P. Jagadpramana and L. Bu Sung, Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on , pp. 765-771.
  12. H. K. Gene and H. S. Eugene, The design and implementation of tripwire: a file system integrity checker,Book The design and implementation of tripwire: a file system integrity checker, Series The design and implementation of tripwire: a file system integrity checker, ed., Editors, ACM, 1994.
  13. Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono, On technical security issues in cloud computing 2009, IEEE Computer Society.
  14. Tina Francis, S. Vadivel, Cloud Computing Security: Concerns, Strategies and Best Practices: Proceedings of 2012 Intemational of Cloud Computing, Technologies, Applications & Management, 2012 IEEE.
  15. Mr. Prashant Rewagad, Ms. Yogita Pawar, Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing, 2013 International Conference on Communication Systems and Network Technologies.
  16. Wang Jun-jie, MuSen, Security Issues and Countermeasures in Cloud Computing, 2011 IEEE.
  17. Balachandra Reddy Kandukuri , Ramakrishna Paturi V, Dr. Atanu Rakshits , “Cloud Security Issues”, 2009 IEEE International Conference on Services Computing,2009 IEEE.
  18. Mrs. G. Nalinipriya ME, (PhD), Mr. R. Aswin Kumar, “Extensive Medical Data Storage with Prominent Symmetric Algorithms On Cloud “, A Protected Framework: 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Authentication Protocol Digital Signature Standard Scheme (DSS) Diffie -Hellman Key Exchange scheme