Enhancement of Security for Data Storage in Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013

Enhancement of Security for Data Storage in Cloud

M. Hemaanand, K.Varalakshmi

Cloud computing is the use of computing resources such as hardware and software that are delivered as a service over the internet. Since the users data are usually processed or stored remotely in unknown machines, user may not have full control over the data and it can be accessed by some third party. The data stored in the cloud should be decentralized in order to adapt to nature of cloud. In the existing system the jar file is used to hide the data which can be subjected to attack. To overcome the above problem the proposed system uses the Steganography method .In this method the data is hidden behind the image and the image is converted into a Jar file and stored in the Cloud, when the data access take place the reverse process is carried out to get the original data and the user is allowed to access the contents in the data. When the data is accessed by the user a separate logger is created to keep track of the user and it is periodically sent to the data owner.

Keywords: cloud computing, data sharing, jar, logger, steganography

Edition: Volume 2 Issue 4, April 2013

Pages: 80 - 82

Share this Article

How to Cite this Article?

M. Hemaanand, K.Varalakshmi, "Enhancement of Security for Data Storage in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013671, Volume 2 Issue 4, April 2013, 80 - 82

108 PDF Views | 97 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Similar Articles with Keyword 'data sharing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Similar Articles with Keyword 'jar'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1293 - 1296

Security Measures on Mobile Technology Using Software as a Service (SaaS)

Apoorva P, Akshay S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 80 - 82

Enhancement of Security for Data Storage in Cloud

M. Hemaanand, K.Varalakshmi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013

Pages: 188 - 190

Accountability for Data Sharing in the Cloud

Anuja Musale, Chaitra Rane, Nikita Zambad, Anuja Birari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 369 - 374

Launching Virtual Machine in OpenNebula and Ensuring Accountability in Cloud Data

Midhu Babu, A. M. J Muthu Kumaran

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 9, September 2014

Pages: 364 - 367

Minimum Bounding Circle of 2D Convex Hull

Asia Mahdi Naser Alzubaidi

Share this Article

Similar Articles with Keyword 'logger'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 732 - 734

Clipboard Logger-For Windows Platform

Pratik R. Tambekar, T. R. Ravi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2395 - 2399

Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme

Dhanashree R. Chaudhari, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1036 - 1039

Avoid Key Logger Attacks Using Blank Virtual Onscreen Keyboard

Jayalekshmi K S, Sunitha S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 80 - 82

Enhancement of Security for Data Storage in Cloud

M. Hemaanand, K.Varalakshmi

Share this Article

Similar Articles with Keyword 'steganography'

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article
Top