Survey on Security Challenge for Data forwarding in Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Information Technology | India | Volume 2 Issue 1, January 2013

Survey on Security Challenge for Data forwarding in Cloud

Tushar A. Rane, Shrishail T. Patil, Anita H. Khade

Cloud Computing emerged as the next-generation architecture of IT Enterprise. As high speed network or Internet access become available to users, so user can easily use many services through Internet from anywhere at any time. Cloud storage system as we called third party provides long term storage service over the internet. It migrate all application software as well as databases to the centralized data centers, which creates challenges in management of the data and services. This paradigm causes many new security challenges during data storage and data forwarding. Storing and movement of data in cloud system make a serious problem about data confidentiality. General encryption scheme protect data confidentiality and also faces some limitations during functioning of the storage system as well as data forwarding. For constructing secure cloud storage with safe data forwarding, here we use proxy cryptosystem and along with this propose conditional proxy re-encryption. The conditional proxy re-encryption used for secure encryption and secure data forwarding.

Keywords: Cloud Computing, Proxy Re-Encryption, Conditional Proxy Re-encryption, Security

Edition: Volume 2 Issue 1, January 2013

Pages: 212 - 216

Share this Article

How to Cite this Article?

Tushar A. Rane, Shrishail T. Patil, Anita H. Khade, "Survey on Security Challenge for Data forwarding in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010184, Volume 2 Issue 1, January 2013, 212 - 216

86 PDF Views | 70 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Review Papers, Information Technology, India, Volume 5 Issue 6, June 2016

Pages: 1456 - 1462

ICT Initiatives in Educational Examination Management-A Review

Jewan Singh, Vibhakar Mansotra

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1773 - 1777

Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling

Muskan Garg, Rajneesh Narula

Share this Article

Similar Articles with Keyword 'Security'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article
Top