International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 101

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015


A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote


Abstract: Cloud computing is a model for using a network of remote servers hosted on the Internet to store, manage and process data. It is a model for enabling widespread and convenient, on-demand access to shared computing resources. It focuses on maximizing the profitable of the shared resources. Cloud computing enables multiple users for accessing a single server to retrieve and update their data, no need to purchase a permit for the different application. In cloud computing, data security is a major issue. After uploading the data on the cloud, data owner has no rights to control the data. For securing the data, everyone wants to trust the third party for the mechanism. The paper proposed an algorithm that consists of data that get slices into different parts. Data present in each slice can encrypt by using a different algorithm. Moreover, the encryption key is applied to data before it stored on the cloud. The objective of our proposed scheme is to store data in a safe and secure manner to avoid data attacks. Another objective is reducing the cost and time required for storing the encrypted data on the cloud.


Keywords: Security, Authentication, Encryption, Decryption, Data attacks, Slicing,


Edition: Volume 4 Issue 12, December 2015,


Pages: 1833 - 1836


How to Cite this Article?

Roshan M. Kawale, Bharti L. Dhote, "A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV152397, Volume 4 Issue 12, December 2015, 1833 - 1836

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Security'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Decryption'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Data attacks'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2153 - 2156

Effective Watermarking Techniques on Structured Datasets

Mini Joswin, Deeksha Bhardwaj

Share this Article

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 972 - 974

A Survey Paper on Data Leak Detection using Semi Honest Provider Framework

Chinar Bhandari, Dr. Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'Slicing'

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3174 - 3177

Optimizing Dynamic Dependence Graph

Toshi Sharma, Madhuri Sharma

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1404 - 1408

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Dhara Anandpara, Rohit Srivastava

Share this Article
Top