Title :
An Architecture for Data Security in Cloud Computing
Author :
Sugumaran, M. ; Murugan, B. Bala ; Kamalraj, D.
Author_Institution :
Dept. of Comput. Sci. & Eng., Pondicherry Eng. Coll., Pondicherry, India
fDate :
Feb. 27 2014-March 1 2014
Abstract :
Cloud computing is a more flexible, cost effective and proven delivery platform for providing business or consumer services over the Internet. Cloud computing supports distributed service oriented architecture, multi-user and multi-domain administrative infrastructure. So, it is more prone to security threats and vulnerabilities. At present, a major concern in cloud adoption is towards its security and privacy. Security and privacy issues are of great concern to cloud service providers who are actually hosting the services. In most cases, the provider must guarantee that their infrastructure is secure and clients´ data and applications are safe, by implementing security policies and mechanisms. The security issues are organized into several general categories: trust, identity management, software isolation, data protection, availability reliability, ownership, data backup, data portability and conversion, multi platform support and intellectual property. In this paper, it is discuss about some of the techniques that were implemented to protect data and propose architecture to protect data in cloud. This architecture was developed to store data in cloud in encrypted data format using cryptography technique which is based on block cipher.
Keywords :
cloud computing; cryptography; data protection; electronic data interchange; industrial property; safety-critical software; service-oriented architecture; block cipher; business services; client data; cloud computing; cloud service providers; consumer services; cryptography technique; data availability; data backup; data conversion; data ownership; data portability; data privacy; data protection; data reliability; data security architecture; data storage; distributed service-oriented architecture; encrypted data format; identity management; intellectual property; multiuser multidomain administrative infrastructure; software isolation; trust factor; Ciphers; Cloud computing; Computer architecture; Encryption; Cloud computing; data privacy; data security; symmetric cryptography; virtualization;
Conference_Titel :
Computing and Communication Technologies (WCCCT), 2014 World Congress on
Conference_Location :
Trichirappalli
Print_ISBN :
978-1-4799-2876-7
DOI :
10.1109/WCCCT.2014.53