International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Survey Paper | Information Technology | India | Volume 2 Issue 1, January 2013

Survey on Security Challenge for Data forwarding in Cloud

Tushar A. Rane, Shrishail T. Patil, Anita H. Khade

Cloud Computing emerged as the next-generation architecture of IT Enterprise. As high speed network or Internet access become available to users, so user can easily use many services through Internet from anywhere at any time. Cloud storage system as we called third party provides long term storage service over the internet. It migrate all application software as well as databases to the centralized data centers, which creates challenges in management of the data and services. This paradigm causes many new security challenges during data storage and data forwarding. Storing and movement of data in cloud system make a serious problem about data confidentiality. General encryption scheme protect data confidentiality and also faces some limitations during functioning of the storage system as well as data forwarding. For constructing secure cloud storage with safe data forwarding, here we use proxy cryptosystem and along with this propose conditional proxy re-encryption. The conditional proxy re-encryption used for secure encryption and secure data forwarding.

Keywords: Cloud Computing, Proxy Re-Encryption, Conditional Proxy Re-encryption, Security

Edition: Volume 2 Issue 1, January 2013

Pages: 212 - 216


How to Cite this Article?

Tushar A. Rane, Shrishail T. Patil, Anita H. Khade, "Survey on Security Challenge for Data forwarding in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010184, Volume 2 Issue 1, January 2013, 212 - 216

25 PDF Views | 21 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2057 - 2060

Secure Load Rebalancing in Cloud Environment

Mannava Praveen Kumar, Srinivas LNB

Share this article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2291 - 2295

Enhanced and Automated Virtual Machine Provisioning to Online E-assessment using Openstack Cloud

Vigneshwaran P

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 969 - 973

Test Usability of Routing Protocol for QoS Parameters in Cloud

Murtuza Petladwala

Share this article

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this article

Similar Articles with Keyword 'Security'

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1945 - 1950

Rooting & Custom Rom in Android

Pranit A. Kamble, Dr. Jyoti Kharade

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1459 - 1462

An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S, Manjula V, Gnanashree S

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this article

Top