Indian Journal of Science and Technology
Year: 2017, Volume: 10, Issue: 6, Pages: 1-7
N. Gowtham Kumar1*, Niranjan Polala2 and D. Aruna Kumari3
1Computer Science and Engineering, KL University, Vijayawada - 522502, Andhra Pradesh, India; [email protected] 2Department of Computer Science and Engineering, KITS, Warangal - 506009, Telangana, India; [email protected] 3Department of Electronics & Computer Engineering, KL University, Vijayawada - 522502, Andhra Pradesh, India. [email protected]
*Author for the correspondence:
N. Gowtham Kumar
Computer Science and Engineering, KL University, Vijayawada - 522502, Andhra Pradesh, India;
E-mail: [email protected]
Background/Objectives: The recent revolution in information technology has had a major impact on Global Communication. The use of Cloud computing in many organizations has significantly increasing due to the benefits in terms of accessibility and inexpensive in general. Due to these anticipated advantages of Cloud Computing many companies and users do not analyze the security issues carefully. Methods/Statistical Analysis: The unprecedented massive surveillance carried out by unauthorized parties around the world threaten cloud users. Offering strong data protection and build confidence to rich applications in the cloud is a challenging task. To mitigate technical impediments in cloud this paper suggested some available security prepositions. Findings: This paper mainly focuses on various propositions such as protecting virtual infrastructures, use of proxies and SSH tunneling, Disk encryption to provide protection for the data at rest, Homomorphic encryption to provide confidentially to the data in transit and finally data integrity to check whether data modified at cloud servers, to take care of privacy and freedom of data of Cloud users while adapting to cloud. Applications/Improvements: These security prepositions may ensure in increasing the trust to incorporate the user services on the cloud beyond the shadow of the doubt.
Keywords: Data Integrity, Encrypted, Homomorphic Encryption, Multi-Tenancy, Massive Surveillance, Side Channels Attacks, Tunneling
Subscribe now for latest articles and news.