Skip to main content

Enhanced Encryption and Decryption Gateway Model for Cloud Data Security in Cloud Storage

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 338))

Abstract

The Cloud computing technology is a concept of providing online multiple resources in the scalable and reliable method. The user will access cloud service as per their requirement of computing level. There is no capital expenditure involved in computing resources for cloud user. The users have to pay as per their storage, network and service usage. The cloud computing have some highlighted issues like compliance, cross border data storage issues, multi-tenant and down time issues. The most important issues are related to storage of data in cloud. Data confidentiality, data integrity, data authentication and regulations on data protection are major problems that affect user’s business. This paper discusses about encryption and decryption data security issues in cloud and its safety measures and comes out with a novel research work of cloud data security model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yu, X., Wen, Q.: A View About Cloud Data Security From Data Life Cycle. In: International Conference on Computational Intelligence and Software Engineering (CiSE), December 10-12, pp. 1–4 (2010)

    Google Scholar 

  2. NIST Definition (February 02, 2014), http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf

  3. Boopathy, D., Sundaresan, M.: Data Encryption Framework Model with Watermark Security for Data Storage in Public Cloud Model. In: International Conference on Computing for Sustainable Global Development, March 5-7, pp. 903–907 (2014)

    Google Scholar 

  4. Boopathy, D., Sundaresan, M.: Location Based Data Encryption Using Policy and Trusted Environment Model for Mobile Cloud Computing. In: Second International Conference on Advances in Cloud Computing, September 19-20, pp. 82–85 (2013)

    Google Scholar 

  5. Kaur, S.: Cryptography and Encryption In Cloud Computing. VSRD International Journal of Computer Science & Information Technology, VSRD-IJCSIT 2(3), 242–249 (2012); Kaur, A., Bhardwaj, M.: Hybrid Encryption For Cloud Database Security. International Journal of Engineering Science & Advanced Technology 2(3), 737–741 (2012)

    Google Scholar 

  6. Cloud Deployment Models, http://bizcloudnetwork.com/defining-cloud-deployment-models (retrieved March 05, 2014)

  7. Tripathi, A., Yadav, P.: Enhancing Security of Cloud Computing using Elliptic Curve Cryptography. International Journal of Computer Applications (0975 - 8887) 57(1), 26–30 (2012)

    Google Scholar 

  8. Vulnerability Rethink, http://www.cbronline.com/news/studycallsforvulnerability_030209 (retrieved January 02, 2014)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Boopathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Boopathy, D., Sundaresan, M. (2015). Enhanced Encryption and Decryption Gateway Model for Cloud Data Security in Cloud Storage. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13731-5_45

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13730-8

  • Online ISBN: 978-3-319-13731-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics