Research Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013
Enhancement of Security for Data Storage in Cloud
M. Hemaanand, K.Varalakshmi
Cloud computing is the use of computing resources such as hardware and software that are delivered as a service over the internet. Since the user’s data are usually processed or stored remotely in unknown machines, user may not have full control over the data and it can be accessed by some third party. The data stored in the cloud should be decentralized in order to adapt to nature of cloud. In the existing system the jar file is used to hide the data which can be subjected to attack. To overcome the above problem the proposed system uses the Steganography method .In this method the data is hidden behind the image and the image is converted into a Jar file and stored in the Cloud, when the data access take place the reverse process is carried out to get the original data and the user is allowed to access the contents in the data. When the data is accessed by the user a separate logger is created to keep track of the user and it is periodically sent to the data owner.
Keywords: cloud computing, data sharing, jar, logger, steganography
Edition: Volume 2 Issue 4, April 2013
Pages: 80 - 82
How to Cite this Article?
M. Hemaanand, K.Varalakshmi, "Enhancement of Security for Data Storage in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013671, Volume 2 Issue 4, April 2013, 80 - 82
108 PDF Views | 97 PDF Downloads
Similar Articles with Keyword 'cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Similar Articles with Keyword 'data sharing'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2097 - 2100Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1232 - 1234A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem
Rashmi Khawale, Omprakash Tembhurne
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2369 - 2374Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage
Ghilby Varghese Jaison
Similar Articles with Keyword 'jar'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1293 - 1296Security Measures on Mobile Technology Using Software as a Service (SaaS)
Apoorva P, Akshay S
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 80 - 82Enhancement of Security for Data Storage in Cloud
M. Hemaanand, K.Varalakshmi
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013
Pages: 188 - 190Accountability for Data Sharing in the Cloud
Anuja Musale, Chaitra Rane, Nikita Zambad, Anuja Birari
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 369 - 374Launching Virtual Machine in OpenNebula and Ensuring Accountability in Cloud Data
Midhu Babu, A. M. J Muthu Kumaran
Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 9, September 2014
Pages: 364 - 367Minimum Bounding Circle of 2D Convex Hull
Asia Mahdi Naser Alzubaidi
Similar Articles with Keyword 'logger'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2097 - 2100Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 732 - 734Clipboard Logger-For Windows Platform
Pratik R. Tambekar, T. R. Ravi
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2395 - 2399Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme
Dhanashree R. Chaudhari, Yogesh B. Gurav
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1036 - 1039Avoid Key Logger Attacks Using Blank Virtual Onscreen Keyboard
Jayalekshmi K S, Sunitha S
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 80 - 82Enhancement of Security for Data Storage in Cloud
M. Hemaanand, K.Varalakshmi
Similar Articles with Keyword 'steganography'
Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015
Pages: 1367 - 1372Comparative Study for Steganography Techniques
Zainalabideen Abdual Samad Rasheed
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1324 - 1327Improving Security for Digital Signature by Using Steganography
G. Pranitha, Ch. Suman Chakravarthy
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan