Survey Paper | Information Technology | India | Volume 2 Issue 1, January 2013
Survey on Security Challenge for Data forwarding in Cloud
Tushar A. Rane, Shrishail T. Patil, Anita H. Khade
Cloud Computing emerged as the next-generation architecture of IT Enterprise. As high speed network or Internet access become available to users, so user can easily use many services through Internet from anywhere at any time. Cloud storage system as we called third party provides long term storage service over the internet. It migrate all application software as well as databases to the centralized data centers, which creates challenges in management of the data and services. This paradigm causes many new security challenges during data storage and data forwarding. Storing and movement of data in cloud system make a serious problem about data confidentiality. General encryption scheme protect data confidentiality and also faces some limitations during functioning of the storage system as well as data forwarding. For constructing secure cloud storage with safe data forwarding, here we use proxy cryptosystem and along with this propose conditional proxy re-encryption. The conditional proxy re-encryption used for secure encryption and secure data forwarding.
Keywords: Cloud Computing, Proxy Re-Encryption, Conditional Proxy Re-encryption, Security
Edition: Volume 2 Issue 1, January 2013
Pages: 212 - 216
How to Cite this Article?
Tushar A. Rane, Shrishail T. Patil, Anita H. Khade, "Survey on Security Challenge for Data forwarding in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010184, Volume 2 Issue 1, January 2013, 212 - 216
25 PDF Views | 21 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Secure Load Rebalancing in Cloud Environment
Mannava Praveen Kumar, Srinivas LNB
Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Enhanced and Automated Virtual Machine Provisioning to Online E-assessment using Openstack Cloud
Test Usability of Routing Protocol for QoS Parameters in Cloud
Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs
Haider N. Hussain
Similar Articles with Keyword 'Security'
Rooting & Custom Rom in Android
Pranit A. Kamble, Dr. Jyoti Kharade
An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques
Kavyashree S, Manjula V, Gnanashree S
Implementation of Location based Encryption in GSM Cellular Network using OPNET
Vijay S. More, Uma R. Godase
Efficient Privacy Protection in Social Networks
Bharath Kumar Gowru, Ramadevi Polagani
Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology
Prateek Shivhare, Savaridassan.P