Security Issues in Cloud Computing-Secure and Distributed Data Storage

Main Article Content

ChintanKumar Patel


The cloud computing is next generation architecture of an IT industry which provides services on demand through Internet. In contrast to the traditional approach where services are under proper physical, logical and personal controls cloud computing moves application, software and database to the large data center where the management of the data and services may not be fully trust worthy as customer are not allowed to monitor the under-laying physical infrastructure. Cloud infrastructure spans across the world, and it’s not visible to user so that many users hesitate to migrate to cloud. That’s why it is essential to provide data security at storage level, so that user cans efficiently stores data in cloud which will improve trust of user in cloud. As data security issue is very crucial issue. So that user can find out most efficient one for their data storage. This will improve data storage efficiency and user trust in cloud. So data integrity is main problem over here so that here some encryption method like DES Algorithm to encrypt data for storage will apply to data which user want to upload over cloud. Here data file will be splitted in parts after that splitted, parts will be encrypted and it is uploading to the cloud storage.


Download data is not yet available.


Metrics Loading ...

Article Details

How to Cite
ChintanKumar Patel. “Security Issues in Cloud Computing-Secure and Distributed Data Storage”. Technix International Journal for Engineering Research, vol. 1, no. 8, Aug. 2014, pp. 107-10,
Research Articles


CHELLAPA, R. (1997) Intermediaries in Cloud Computing: A new Computing Paradigm. Cluster: Electronic Commerce.

MichaelArmbrust, ArmandoFox, ReanGriffith, AnthonyD.Joseph, RandyH.Katz, AndrewKonwinski, GunhoLee, DavidA.Patterson, ArielRabkin, IonStoica and MateiZaharia. Above the Clouds :Aberkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb 2009.

Cloud Computing Security: How Secure is the Cloud? SecureIsTheCloud92640.aspx accessed: 19/10/2013

Adarsh R.,P. ChidanandaMurthy, Secure Storage and Data Integrity Proof in Cloud, Adarsh R. et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5030-5032

Prasanth SP, 2Gowtham B, AES and DES Using Secure and Dynamic Data Storage in Cloud, International Journal of Computer Science and Mobile Computing,January 2014

E.Mykletun,M.Narasimha, and G. Tsudik, “Authentication and integrity in outsourced databases,” Trans. Storage, vol. 2, no. 2, pp. 107–138, 2006.

D.X.Song, D.Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in SP ’00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000

A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2007, pp. 584–597.