UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 9 | September 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 2
February-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1902134


Registration ID:
195503

Page Number

224-229

Share This Article


Jetir RMS

Title

Data security In Cloud from the user end to the cloud and vice-versa using different techniques

Abstract

Cloud computing is a technology that has brought revolution in IT industry because of its performance ,availability, accessibility etc.It doesn't require any new infra structure and it maximize the capacity of new personnel or licensing new software. It provides big storage for data and computation power is very fast and it is serving large amount of customers. It necessarily shift the database and application to the large data base centers which is known as cloud where data is not completely secure. Because of which companies do not prefer to deploy their business to cloud even when it offer so many things. The data security in cloud is one of the major issue we are facing in the implementation of the cloud. So we present a paper in which we provide a solution for the security of cloud.We try to give complete security i.e from the data owner to the cloud and from cloud to the user of data. We use the classification of data on the basics of 3 parameter presented by the user i.e Confidentiality (C), Integrity(I) and Availability(A).The strategy followed to protect the data utilizes various measures such as the SSL (Secure Socket Layer) 128-bit encryption and can also be raised to 256-bit encryption ,the MAC (Message Authentication Code) is used for integrity check of data, searchable encryption and division of data in cloud for storage.

Key Words

Cloud security,Message authentication code, Confidentiality,Availability,Integrity

Cite This Article

"Data security In Cloud from the user end to the cloud and vice-versa using different techniques", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 2, page no.224-229, February-2019, Available :http://www.jetir.org/papers/JETIR1902134.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Data security In Cloud from the user end to the cloud and vice-versa using different techniques", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 2, page no. pp224-229, February-2019, Available at : http://www.jetir.org/papers/JETIR1902134.pdf

Publication Details

Published Paper ID: JETIR1902134
Registration ID: 195503
Published In: Volume 6 | Issue 2 | Year February-2019
DOI (Digital Object Identifier):
Page No: 224-229
Country: Indore, Madhya Pradesh, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002989

Print This Page

Current Call For Paper

Jetir RMS