SlideShare a Scribd company logo
Journal for Research | Volume 03| Issue 01 | March 2017
ISSN: 2395-7549
All rights reserved by www.journal4research.org 77
Security Based Issues in View of Cloud Based
Storage System
Grusha Chouhan Ankit Upadhyay
Department of Computer Science & Engineering Department of Computer Science & Engineering
Acropolis Technical Campus, Indore, India Acropolis Technical Campus, Indore, India
Anuradha Deolase Prashant Lakkadwala
Department of Computer Science & Engineering Department of Computer Science & Engineering
Acropolis Technical Campus, Indore, India Acropolis Technical Campus, Indore, India
Abstract
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and
usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver
only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means
data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from
unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud
confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage
and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code
(MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large
amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA,
Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is
under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it
fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while
saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored
data is investigated, has been given more attention recently.
Keywords: Cloud Computing, Information Security, Security Based Issues
_______________________________________________________________________________________________________
I. INTRODUCTION
Cloud computing is mainly used for data storage. Here the data is stored on multiple third-party servers [2]
. The user sees a virtual
server; it appears as if the data is stored in a particular place with a specific name, when storing the data. This doesn’t exist in
reality. It’s just used to reference the virtual space of the cloud. In reality, the user’s data could be stored on any one or more of
the computers used to create the cloud. Three important conditions for the data security over the cloud are (i) Confidentiality [8]
,
(ii) Integrity [4]
, (iii) Availability [5][8]
. Understanding cloud security risks is related to understanding the relationships and
dependencies between cloud computing models and how they are deployed. IaaS[5][9]
forms the foundation of the service model
architecture, PaaS builds upon IaaS, and SaaS[5][9]
in turn builds upon PaaS[5][9]
; and information security issues and risks are
inherited just as capabilities are.
Cloud allows users to achieve the power of computing which beats their own physical domain. It leads to many security
problems. The cloud service provider for cloud makes sure that the customer does not face any problem such as loss of data or
data theft. Cloud computing infrastructures use new technologies and services, most of which haven’t been fully evaluated with
respect to security [9]
.
Cryptography can be seen as a method of storing and disguising confidential data in a cryptic form so that only those for
whom it is intended can read it and are able to communicate information in the presence of an adversary and the security
algorithms mitigate security issues by use of cryptography, authentication and distributing keys securely. Cryptography is thus
the science of making data and messages secure by converting the end user data to be sent into cryptic non-readable form and
encrypting or scrambling the plaintext by taking user data or that referred to as clear text and converting it into cipher text and
then performing decryption which is reverting back to the original plain text. Cryptography is used for providing the following
security:
 Data Integrity: information has value only if it is correct, this refers to maintaining and assuring the accuracy and
consistency of data, its implementation for computer systems that store use data, processes, or retrieve that data [4]
.
 Authentication for determining whether someone or something is, in fact, who or what it is declared to be [3]
.
 Non Repudiation: is the assurance that a party, contract or someone cannot deny the authenticity of their signature and
sending a message that they originated [2]
.
Security Based Issues in View of Cloud Based Storage System
(J4R/ Volume 03 / Issue 01 / 016)
All rights reserved by www.journal4research.org 78
 Confidentiality: relates to loss of privacy, unauthorized access to information and identity theft [8]
.
Fig. 1: Cloud Computing Solutions
II. SECURITY CONCERNS
The security concerns are end user data security, network traffic, file systems [7]
, and host machine security which cryptography
can resolve to some extent and thus helps organizations in their reluctant acceptance of Cloud Computing [7]
. There are various
security issues that arise in the Cloud:
 Ensuring Secure Data Transfer: In a Cloud environment, the physical location and reach are not under end user control of
where the resources are hosted [8]
.
 Ensuring Secure Interface: integrity of information during transfer, storage and retrieval needs to be ensured over the
unsecure internet [8]
.
 Have Separation of data: privacy issues arise when personal data is accessed by Cloud providers or boundaries between
personal and corporate data do not have clearly defined policies.
 Secure Stored Data: question mark on controlling the encryption and decryption by either the end user or the Cloud Service
provider.
 User Access Control: for web based transactions (PCI DSS), web data logs need to be provided to compliance auditors and
security managers [8]
.
Fig. 2: Asymmetric encryption-decryption for communication
III. SECURITY ALGORITHMS
Security algorithms which are used for cryptography [1][10]
are classified in three categories:
 Hash key algorithms: Compress data for signing to standard fixed size. Examples include: MD5, SHA
 Private Key / Symmetric Algorithms: Use single secret key for encrypting large amount of data and have fast processing
speed. These algorithms use a single secret key that is known to the sender and receiver. RC6, 3DES, Blowfish, AES are
some examples of this algorithms [6][7]
.
 Public Key [8]
/ Asymmetric Algorithms: Use a key pair for cryptographic process, with public key for encryption and
private for decryption. These algorithms have a high computational cost and thus slow speed if compared to the single key
symmetric algorithms. RSA and Diffie-Hellman are some types of public key algorithms [6][7]
.
Security Based Issues in View of Cloud Based Storage System
(J4R/ Volume 03 / Issue 01 / 016)
All rights reserved by www.journal4research.org 79
IV. ALGORITHMS
 Data Encryption Standard (DES)
 Triple- DES (TDES)
 Blowfish Algorithm
 IDEA
 Homomorphic Encryption
 RSA
 Diffie- Hellman Key Exchange
Data Encryption Standard (DES)
DES is very commonly used symmetric key algorithm.[6]
It was developed by IBM in 1974, but now a day’s many methods are
found that had proven this algorithm unsecured. A block cipher is a method of encryption text (to produce cipher) in which a
cryptographic key and algorithm are applied to a block of data (for ex: - 64 contiguous bits) at once as a group rather than to one
bit at a time. The main alternative method, used much less frequently is called “Stream Cipher”. In DES algorithm block cipher
is of 64 bits and key used are 56 out of 64 bits.
Algorithm
Step 1:- The 64-bit plain text block is handed over to an INITIAL PERMUTATION (IP) function.
Step 2:- The initial permutation is performed on plain text.
Step 3:-Next, The initial permutation (IP) produces two halves of the permuted block i.e., Left Plain Text (LPT) and Right Plain
Text (RPT).
Step 4:-Now, each of LPT and RPT go through 64 rounds of encryption process, each with its own key.
Step 5:-In the end, LPT and RPT are rejoined, and a FINAL PERMUTATION (FP) is performed on the combined block.
Step 6:-The result of this process produces 64-bit cipher text.
Triple- DES (TDES)
TDES is enhanced version of DES in TDES the key size is increased to increase i.e. 168 bits the security of data. In TDES only
size of key is increased rest of the working is similar to DES. In TDES three different keys are applied on cipher block i.e. k 1, k
2 and k 3. [6][10]
Algorithm
Step 1:- Encrypt the plain text with key K1. Thus, we have Ek1(P).
Step 2:-Decrypt the output of step1 above with key K2. Thus, we have Dk2(Ek1(P)).
Step 3:-Finally, Encrypt the output of step 2 again with key K1. Thus, we have Ek1(Dk2(Ek1(P))).
Blowfish Algorithm
Blowfish Algorithm is a symmetric key algorithm [6]
which was developed in 1993 by Bruce Schneier. In DES key size is small
and can be decrypted easily but in Blowfish algorithm the size of key is large and it can vary from 32 to 448 bits. In Blowfish
algorithm also 64 bits of plain text is divided into two parts of size 32 bits.
Algorithm
Step 1:- Divide X into two blocks: XL and XR, of equal sizes. Thus, both XL and XR will consist of 32 bits each.
Step 2:- For i=1 to 16
XL=XL XOR Pi
XR=F (XL) XOR XR
Next i
Step 3:- Swap XL, XR (i.e. undo last swap).
Step 4:- XL=XL XOR P18.
Step 5:- Combine XL and XR back into X.
IDEA
International Data Encryption Algorithm was proposed by James Massey and Xuejia Lai in 1991.It is considered as best
symmetric key algorithm. It accepts 64 bits plain text and key size is 128 bits.
Algorithm
Step 1:-The 64-bit input plain text block is divided into four portions of plain text (each of size 16 bits), P1 to P4.Thus, P1 to P4
are the inputs to the first round of the algorithm. There are eight such rounds. The keys consist of 128 bits.
Step 2:-In each round, six sub keys are generated from the original key. Each of sub keys consists of 16 bits. These six sub keys
are applied are applied to the four input blocks P1 to P4. Thus, for the first round, we will have the six keys k1 to k6. For the
second round we will have k7 to k12.Finally, for the eight round we will have keys k43 to k48.
Step 3:-The final step consists of an OUTPUT TRANSFORMATION, which uses four sub keys (k49-k52).
Security Based Issues in View of Cloud Based Storage System
(J4R/ Volume 03 / Issue 01 / 016)
All rights reserved by www.journal4research.org 80
Step 4:-The final output produced is the output produced by the output transformation step, which is four blocks of cipher text
named C1 to C4 (each consisting of 16 bits).
Step 5:-These are combined to form the final 64-bit cipher-text block.
Homomorphic Encryption
Homomorphic encryption uses asymmetric key algorithm in which two different keys are used for encryption and decryption i.e.
public key and private key . In mathematics homomorphic means conversion of one data set to another, without losing its
relation between them. In homomorpic complex mathematics functions are applied to encrypt the data and similar but reverse
operation is applied to decrypt the data.
RSA
RSA was invented by Ranold Fivest, Adi Shamir [3]
and Leonard Adleman in 1977. RSA is also an asymmetric algorithm. [6][10]
Functioning of RSA is based on multiplication of two large numbers. Two large prime numbers are generated and multiplied.
After multiplying two numbers, modulus is calculated the number that is generated is used as the public and private key. The two
numbers that are used for multiplication-one of them is public other is private.
Algorithm
Step 1:-Choose two large numbers P and Q.
Step 2:-Calculate N+P*Q.
Step 3:-Select the public key (i.e. the encryption key) E such that it is not a factor of (P-1) and (Q-1).
Step 4:-Select the private key (i.e. the decryption key) D such that the following equation is true:
(D*E) mod (P-1)*(Q-1)=1
Step 5:-For encryption, calculate the cipher text t CT from the plain text PT as follows:
CT=PTE
mod N
Step 6:-Send CT as the cipher text to the receiver.
Step 7:-For decryption, calculate the plain text PT from the cipher text CT as follows: PT=CTD
mod N
Diffie- Hellman Key Exchange
Diffie Hellman key exchange algorithm was developed by Whitfield Diffie and Martin Hellman in 1976. Diffie Hellman also
required two different keys [6]
. In Diffie Hellman Key Exchange, a shared secret key established, that is used that is used for
communication over the public network [10]
.
Algorithm
Step 1:-Firstly, Alice and Bob agree on two large prime numbers, n and g. These two integers need not be kept secret. Alice and
bob can use an insecure channel to agree on them.
Step 2:-Alice chooses another large random number x, and calculates A such that:
A=gx
mod n
Step 3:-Alice sends the number A to Bob.
Step4:-Bob independently chooses another large random integer y and calculates B such that:
B=gy
mod n
Step 5:-Bob sends the number B to Alice.
Step 6:-A now computes the secret key k1 as follows:
K1=Bx
mod n
Step 7:-B now computes the secret key K2 as follows:
K2=Ay
mod n
V. CONCLUSIONS
The system will contribute in the designing and development of a user space cryptographic file system. The design goal will
mainly focus on the security of the file system. The system will be very convenient to the user and the independenbility will be
achieved with the help of java technology which is highly portable.
REFERENCES
[1] “Cloud Security Algorithms” International Journal of Security and its Applications, Vol. 9, No.10 (2015), pp.353-360
[2] Dr. NEDHAL A. AL-SAIYD, NADA SAIL “Data Integrity in Cloud Computing Security” Journal of Theoretical and Applied Information Technology,
Vol. 58 No. 3, December 2013
[3] Mandar Kadam, Stewyn Chaudhary, Bony Carvalho, “Security Approach for Multi-Cloud Data Storage” International Journal of Computer Applications
(0975-8887) Volume 126-N0.4, September 2015
[4] “Identifying Data Integrity in the Cloud Storage” International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012
[5] “TREM: A New Cloud Security Algorithm” International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 4,
April 2016
[6] Randeep Kaur , Supriya Kinger “Analysis of Security Algorithms in Cloud Computing” International Journal of Application or Innovation in Engineering
& Management (IJAIEM) Volume 3, Issue 3, March 2014
Security Based Issues in View of Cloud Based Storage System
(J4R/ Volume 03 / Issue 01 / 016)
All rights reserved by www.journal4research.org 81
[7] S. P. Jaikar, M. V. Nimbalkar, “Verifying Data Integrity in Cloud”, International Journal of Applied Information Systems Volume 3– No.1, July2012
[8] Sultan Aldossary, William Allen “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions” International
Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016
[9] “Security Issues and Security Algorithms in Cloud Computing” International Journal of Advanced Research in Computer Science and Software
Engineering Volume 2, Issue 10, October 2012
[10] “Security Algorithms for Cloud Computing” International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science
85 ( 2016 ) 535 – 542
[11] Upadhyay and P. Lakkadwala, "Secure live migration of VM's in Cloud Computing: A survey," Reliability, Infocom Technologies and Optimization
(ICRITO) (Trends and Future Directions), 2014 3rd International Conference on, Noida, 2014, pp.1-4.doi: 10.1109/ICRITO.2014.7014766.
[12] Upadhyay, A.; Lakkadwala, P., "Performance evolution of higher reliability task in cloud computing," 2014 Conference on IT in Business, Industry and
Government (CSIBIG), vol., no., pp.1,3, 8-9 March 2014 doi: 10.1109/CSIBIG.2014.7056956.
[13] Palkesh Soni, Ankit Upadhyay, Arvind Maheshwari and Prashant Lakkadwala, “Security Related Issues in Cloud Computing: A Survey”, IJIRST –
International Journal for Innovative Research in Science & Technology| Volume 2 | Issue 11 | April 2016 ISSN (online): 2349-6010.

More Related Content

What's hot

Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
ALIN BABU
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
 
Secry poster
Secry posterSecry poster
Secry poster
ALIN BABU
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
Sathya Madhesh
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
V5 i7 0169
V5 i7 0169V5 i7 0169
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
IJRAT
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
FellowBuddy.com
 
C017421624
C017421624C017421624
C017421624
IOSR Journals
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
 

What's hot (19)

Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Secry poster
Secry posterSecry poster
Secry poster
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
262 265
262 265262 265
262 265
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
C017421624
C017421624C017421624
C017421624
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 

Similar to SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
ijtsrd
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
IOSR Journals
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
IJERA Editor
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
HimaBinduKrovvidi
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
J017667582
J017667582J017667582
J017667582
IOSR Journals
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
IJECEIAES
 
F017414853
F017414853F017414853
F017414853
IOSR Journals
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 

Similar to SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM (20)

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
L017136269
L017136269L017136269
L017136269
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
J017667582
J017667582J017667582
J017667582
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
F017414853
F017414853F017414853
F017414853
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 

More from Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
Journal For Research
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
Journal For Research
 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM

  • 1. Journal for Research | Volume 03| Issue 01 | March 2017 ISSN: 2395-7549 All rights reserved by www.journal4research.org 77 Security Based Issues in View of Cloud Based Storage System Grusha Chouhan Ankit Upadhyay Department of Computer Science & Engineering Department of Computer Science & Engineering Acropolis Technical Campus, Indore, India Acropolis Technical Campus, Indore, India Anuradha Deolase Prashant Lakkadwala Department of Computer Science & Engineering Department of Computer Science & Engineering Acropolis Technical Campus, Indore, India Acropolis Technical Campus, Indore, India Abstract With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently. Keywords: Cloud Computing, Information Security, Security Based Issues _______________________________________________________________________________________________________ I. INTRODUCTION Cloud computing is mainly used for data storage. Here the data is stored on multiple third-party servers [2] . The user sees a virtual server; it appears as if the data is stored in a particular place with a specific name, when storing the data. This doesn’t exist in reality. It’s just used to reference the virtual space of the cloud. In reality, the user’s data could be stored on any one or more of the computers used to create the cloud. Three important conditions for the data security over the cloud are (i) Confidentiality [8] , (ii) Integrity [4] , (iii) Availability [5][8] . Understanding cloud security risks is related to understanding the relationships and dependencies between cloud computing models and how they are deployed. IaaS[5][9] forms the foundation of the service model architecture, PaaS builds upon IaaS, and SaaS[5][9] in turn builds upon PaaS[5][9] ; and information security issues and risks are inherited just as capabilities are. Cloud allows users to achieve the power of computing which beats their own physical domain. It leads to many security problems. The cloud service provider for cloud makes sure that the customer does not face any problem such as loss of data or data theft. Cloud computing infrastructures use new technologies and services, most of which haven’t been fully evaluated with respect to security [9] . Cryptography can be seen as a method of storing and disguising confidential data in a cryptic form so that only those for whom it is intended can read it and are able to communicate information in the presence of an adversary and the security algorithms mitigate security issues by use of cryptography, authentication and distributing keys securely. Cryptography is thus the science of making data and messages secure by converting the end user data to be sent into cryptic non-readable form and encrypting or scrambling the plaintext by taking user data or that referred to as clear text and converting it into cipher text and then performing decryption which is reverting back to the original plain text. Cryptography is used for providing the following security:  Data Integrity: information has value only if it is correct, this refers to maintaining and assuring the accuracy and consistency of data, its implementation for computer systems that store use data, processes, or retrieve that data [4] .  Authentication for determining whether someone or something is, in fact, who or what it is declared to be [3] .  Non Repudiation: is the assurance that a party, contract or someone cannot deny the authenticity of their signature and sending a message that they originated [2] .
  • 2. Security Based Issues in View of Cloud Based Storage System (J4R/ Volume 03 / Issue 01 / 016) All rights reserved by www.journal4research.org 78  Confidentiality: relates to loss of privacy, unauthorized access to information and identity theft [8] . Fig. 1: Cloud Computing Solutions II. SECURITY CONCERNS The security concerns are end user data security, network traffic, file systems [7] , and host machine security which cryptography can resolve to some extent and thus helps organizations in their reluctant acceptance of Cloud Computing [7] . There are various security issues that arise in the Cloud:  Ensuring Secure Data Transfer: In a Cloud environment, the physical location and reach are not under end user control of where the resources are hosted [8] .  Ensuring Secure Interface: integrity of information during transfer, storage and retrieval needs to be ensured over the unsecure internet [8] .  Have Separation of data: privacy issues arise when personal data is accessed by Cloud providers or boundaries between personal and corporate data do not have clearly defined policies.  Secure Stored Data: question mark on controlling the encryption and decryption by either the end user or the Cloud Service provider.  User Access Control: for web based transactions (PCI DSS), web data logs need to be provided to compliance auditors and security managers [8] . Fig. 2: Asymmetric encryption-decryption for communication III. SECURITY ALGORITHMS Security algorithms which are used for cryptography [1][10] are classified in three categories:  Hash key algorithms: Compress data for signing to standard fixed size. Examples include: MD5, SHA  Private Key / Symmetric Algorithms: Use single secret key for encrypting large amount of data and have fast processing speed. These algorithms use a single secret key that is known to the sender and receiver. RC6, 3DES, Blowfish, AES are some examples of this algorithms [6][7] .  Public Key [8] / Asymmetric Algorithms: Use a key pair for cryptographic process, with public key for encryption and private for decryption. These algorithms have a high computational cost and thus slow speed if compared to the single key symmetric algorithms. RSA and Diffie-Hellman are some types of public key algorithms [6][7] .
  • 3. Security Based Issues in View of Cloud Based Storage System (J4R/ Volume 03 / Issue 01 / 016) All rights reserved by www.journal4research.org 79 IV. ALGORITHMS  Data Encryption Standard (DES)  Triple- DES (TDES)  Blowfish Algorithm  IDEA  Homomorphic Encryption  RSA  Diffie- Hellman Key Exchange Data Encryption Standard (DES) DES is very commonly used symmetric key algorithm.[6] It was developed by IBM in 1974, but now a day’s many methods are found that had proven this algorithm unsecured. A block cipher is a method of encryption text (to produce cipher) in which a cryptographic key and algorithm are applied to a block of data (for ex: - 64 contiguous bits) at once as a group rather than to one bit at a time. The main alternative method, used much less frequently is called “Stream Cipher”. In DES algorithm block cipher is of 64 bits and key used are 56 out of 64 bits. Algorithm Step 1:- The 64-bit plain text block is handed over to an INITIAL PERMUTATION (IP) function. Step 2:- The initial permutation is performed on plain text. Step 3:-Next, The initial permutation (IP) produces two halves of the permuted block i.e., Left Plain Text (LPT) and Right Plain Text (RPT). Step 4:-Now, each of LPT and RPT go through 64 rounds of encryption process, each with its own key. Step 5:-In the end, LPT and RPT are rejoined, and a FINAL PERMUTATION (FP) is performed on the combined block. Step 6:-The result of this process produces 64-bit cipher text. Triple- DES (TDES) TDES is enhanced version of DES in TDES the key size is increased to increase i.e. 168 bits the security of data. In TDES only size of key is increased rest of the working is similar to DES. In TDES three different keys are applied on cipher block i.e. k 1, k 2 and k 3. [6][10] Algorithm Step 1:- Encrypt the plain text with key K1. Thus, we have Ek1(P). Step 2:-Decrypt the output of step1 above with key K2. Thus, we have Dk2(Ek1(P)). Step 3:-Finally, Encrypt the output of step 2 again with key K1. Thus, we have Ek1(Dk2(Ek1(P))). Blowfish Algorithm Blowfish Algorithm is a symmetric key algorithm [6] which was developed in 1993 by Bruce Schneier. In DES key size is small and can be decrypted easily but in Blowfish algorithm the size of key is large and it can vary from 32 to 448 bits. In Blowfish algorithm also 64 bits of plain text is divided into two parts of size 32 bits. Algorithm Step 1:- Divide X into two blocks: XL and XR, of equal sizes. Thus, both XL and XR will consist of 32 bits each. Step 2:- For i=1 to 16 XL=XL XOR Pi XR=F (XL) XOR XR Next i Step 3:- Swap XL, XR (i.e. undo last swap). Step 4:- XL=XL XOR P18. Step 5:- Combine XL and XR back into X. IDEA International Data Encryption Algorithm was proposed by James Massey and Xuejia Lai in 1991.It is considered as best symmetric key algorithm. It accepts 64 bits plain text and key size is 128 bits. Algorithm Step 1:-The 64-bit input plain text block is divided into four portions of plain text (each of size 16 bits), P1 to P4.Thus, P1 to P4 are the inputs to the first round of the algorithm. There are eight such rounds. The keys consist of 128 bits. Step 2:-In each round, six sub keys are generated from the original key. Each of sub keys consists of 16 bits. These six sub keys are applied are applied to the four input blocks P1 to P4. Thus, for the first round, we will have the six keys k1 to k6. For the second round we will have k7 to k12.Finally, for the eight round we will have keys k43 to k48. Step 3:-The final step consists of an OUTPUT TRANSFORMATION, which uses four sub keys (k49-k52).
  • 4. Security Based Issues in View of Cloud Based Storage System (J4R/ Volume 03 / Issue 01 / 016) All rights reserved by www.journal4research.org 80 Step 4:-The final output produced is the output produced by the output transformation step, which is four blocks of cipher text named C1 to C4 (each consisting of 16 bits). Step 5:-These are combined to form the final 64-bit cipher-text block. Homomorphic Encryption Homomorphic encryption uses asymmetric key algorithm in which two different keys are used for encryption and decryption i.e. public key and private key . In mathematics homomorphic means conversion of one data set to another, without losing its relation between them. In homomorpic complex mathematics functions are applied to encrypt the data and similar but reverse operation is applied to decrypt the data. RSA RSA was invented by Ranold Fivest, Adi Shamir [3] and Leonard Adleman in 1977. RSA is also an asymmetric algorithm. [6][10] Functioning of RSA is based on multiplication of two large numbers. Two large prime numbers are generated and multiplied. After multiplying two numbers, modulus is calculated the number that is generated is used as the public and private key. The two numbers that are used for multiplication-one of them is public other is private. Algorithm Step 1:-Choose two large numbers P and Q. Step 2:-Calculate N+P*Q. Step 3:-Select the public key (i.e. the encryption key) E such that it is not a factor of (P-1) and (Q-1). Step 4:-Select the private key (i.e. the decryption key) D such that the following equation is true: (D*E) mod (P-1)*(Q-1)=1 Step 5:-For encryption, calculate the cipher text t CT from the plain text PT as follows: CT=PTE mod N Step 6:-Send CT as the cipher text to the receiver. Step 7:-For decryption, calculate the plain text PT from the cipher text CT as follows: PT=CTD mod N Diffie- Hellman Key Exchange Diffie Hellman key exchange algorithm was developed by Whitfield Diffie and Martin Hellman in 1976. Diffie Hellman also required two different keys [6] . In Diffie Hellman Key Exchange, a shared secret key established, that is used that is used for communication over the public network [10] . Algorithm Step 1:-Firstly, Alice and Bob agree on two large prime numbers, n and g. These two integers need not be kept secret. Alice and bob can use an insecure channel to agree on them. Step 2:-Alice chooses another large random number x, and calculates A such that: A=gx mod n Step 3:-Alice sends the number A to Bob. Step4:-Bob independently chooses another large random integer y and calculates B such that: B=gy mod n Step 5:-Bob sends the number B to Alice. Step 6:-A now computes the secret key k1 as follows: K1=Bx mod n Step 7:-B now computes the secret key K2 as follows: K2=Ay mod n V. CONCLUSIONS The system will contribute in the designing and development of a user space cryptographic file system. The design goal will mainly focus on the security of the file system. The system will be very convenient to the user and the independenbility will be achieved with the help of java technology which is highly portable. REFERENCES [1] “Cloud Security Algorithms” International Journal of Security and its Applications, Vol. 9, No.10 (2015), pp.353-360 [2] Dr. NEDHAL A. AL-SAIYD, NADA SAIL “Data Integrity in Cloud Computing Security” Journal of Theoretical and Applied Information Technology, Vol. 58 No. 3, December 2013 [3] Mandar Kadam, Stewyn Chaudhary, Bony Carvalho, “Security Approach for Multi-Cloud Data Storage” International Journal of Computer Applications (0975-8887) Volume 126-N0.4, September 2015 [4] “Identifying Data Integrity in the Cloud Storage” International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012 [5] “TREM: A New Cloud Security Algorithm” International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 4, April 2016 [6] Randeep Kaur , Supriya Kinger “Analysis of Security Algorithms in Cloud Computing” International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 3, Issue 3, March 2014
  • 5. Security Based Issues in View of Cloud Based Storage System (J4R/ Volume 03 / Issue 01 / 016) All rights reserved by www.journal4research.org 81 [7] S. P. Jaikar, M. V. Nimbalkar, “Verifying Data Integrity in Cloud”, International Journal of Applied Information Systems Volume 3– No.1, July2012 [8] Sultan Aldossary, William Allen “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions” International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016 [9] “Security Issues and Security Algorithms in Cloud Computing” International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 10, October 2012 [10] “Security Algorithms for Cloud Computing” International Conference on Computational Modeling and Security (CMS 2016), Procedia Computer Science 85 ( 2016 ) 535 – 542 [11] Upadhyay and P. Lakkadwala, "Secure live migration of VM's in Cloud Computing: A survey," Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on, Noida, 2014, pp.1-4.doi: 10.1109/ICRITO.2014.7014766. [12] Upadhyay, A.; Lakkadwala, P., "Performance evolution of higher reliability task in cloud computing," 2014 Conference on IT in Business, Industry and Government (CSIBIG), vol., no., pp.1,3, 8-9 March 2014 doi: 10.1109/CSIBIG.2014.7056956. [13] Palkesh Soni, Ankit Upadhyay, Arvind Maheshwari and Prashant Lakkadwala, “Security Related Issues in Cloud Computing: A Survey”, IJIRST – International Journal for Innovative Research in Science & Technology| Volume 2 | Issue 11 | April 2016 ISSN (online): 2349-6010.