Survey Paper | Information Technology | India | Volume 2 Issue 1, January 2013
Survey on Security Challenge for Data forwarding in Cloud
Tushar A. Rane, Shrishail T. Patil, Anita H. Khade
Cloud Computing emerged as the next-generation architecture of IT Enterprise. As high speed network or Internet access become available to users, so user can easily use many services through Internet from anywhere at any time. Cloud storage system as we called third party provides long term storage service over the internet. It migrate all application software as well as databases to the centralized data centers, which creates challenges in management of the data and services. This paradigm causes many new security challenges during data storage and data forwarding. Storing and movement of data in cloud system make a serious problem about data confidentiality. General encryption scheme protect data confidentiality and also faces some limitations during functioning of the storage system as well as data forwarding. For constructing secure cloud storage with safe data forwarding, here we use proxy cryptosystem and along with this propose conditional proxy re-encryption. The conditional proxy re-encryption used for secure encryption and secure data forwarding.
Keywords: Cloud Computing, Proxy Re-Encryption, Conditional Proxy Re-encryption, Security
Edition: Volume 2 Issue 1, January 2013
Pages: 212 - 216
How to Cite this Article?
Tushar A. Rane, Shrishail T. Patil, Anita H. Khade, "Survey on Security Challenge for Data forwarding in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010184, Volume 2 Issue 1, January 2013, 212 - 216
127 PDF Views | 105 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 1773 - 1777Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling
Muskan Garg, Rajneesh Narula
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015
Pages: 1736 - 1745Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs
Haider N. Hussain
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Similar Articles with Keyword 'Security'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014
Pages: 607 - 611A Survey Based on Fingerprint Recognition - Minutiae
Annapoorani. D, Caroline Viola Stella Mery. M
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George