Main Article Content
The cloud computing is next generation architecture of an IT industry which provides services on demand through Internet. In contrast to the traditional approach where services are under proper physical, logical and personal controls cloud computing moves application, software and database to the large data center where the management of the data and services may not be fully trust worthy as customer are not allowed to monitor the under-laying physical infrastructure. Cloud infrastructure spans across the world, and it’s not visible to user so that many users hesitate to migrate to cloud. That’s why it is essential to provide data security at storage level, so that user cans efficiently stores data in cloud which will improve trust of user in cloud. As data security issue is very crucial issue. So that user can find out most efficient one for their data storage. This will improve data storage efficiency and user trust in cloud. So data integrity is main problem over here so that here some encryption method like DES Algorithm to encrypt data for storage will apply to data which user want to upload over cloud. Here data file will be splitted in parts after that splitted, parts will be encrypted and it is uploading to the cloud storage.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
CHELLAPA, R. (1997) Intermediaries in Cloud Computing: A new Computing Paradigm. Cluster: Electronic Commerce.
MichaelArmbrust, ArmandoFox, ReanGriffith, AnthonyD.Joseph, RandyH.Katz, AndrewKonwinski, GunhoLee, DavidA.Patterson, ArielRabkin, IonStoica and MateiZaharia. Above the Clouds :Aberkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb 2009.
Cloud Computing Security: How Secure is the Cloud? http://www.researchomatic.com/essay/CloudComputing-SecurityHow SecureIsTheCloud92640.aspx accessed: 19/10/2013
Adarsh R.,P. ChidanandaMurthy, Secure Storage and Data Integrity Proof in Cloud, Adarsh R. et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5030-5032
Prasanth SP, 2Gowtham B, AES and DES Using Secure and Dynamic Data Storage in Cloud, International Journal of Computer Science and Mobile Computing,January 2014
E.Mykletun,M.Narasimha, and G. Tsudik, “Authentication and integrity in outsourced databases,” Trans. Storage, vol. 2, no. 2, pp. 107–138, 2006.
D.X.Song, D.Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in SP ’00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000
A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 584–597.