Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Shravani, B.
- Cloud Computing Data Security in Cloud Computing for Banking
Abstract Views :427 |
PDF Views:186
Authors
Affiliations
1 Surana College, Bangalore, IN
1 Surana College, Bangalore, IN
Source
Adarsh Journal of Information Technology, Vol 2, No 1 (2015), Pagination: 50-61Abstract
Cloud Computing has been anticipated as the next generation architecture of IT Enterprise. Cloud Computing moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges. In this paper, we focus on cloud data storage security for banking, which has always been an important aspect of quality services in banking sector. To ensure the correctness of users' data in the cloud, we propose an effective and flexible solution.As customers we do not need to own the infrastructure, Data can be redundantly store in multiple physical locations. Due to this redundancy the data can be easily modified by unauthorized users which can be stored in the database. This leads to loss of data privacy and security to database. Extensive security and performance analysis shows that the proposed scheme ensures that cyclicredundancy check and time-tested practices and technologies for managing trust relationships in traditional enterprises.These practices include data encryption, strong authentication and fraud detection, etc.
Keywords
Cloud Computing, Application Software, Redundancy, Data Encryption, Strong Authentication and Fraud Detection.References
- http://www.ibm.com/developerworks
- http://www.jackcola.org
- https://securosis.com/blog/cloud-datasecuritycycle
- http://searchtelecom.techtarget.com
- K. D. Bowers, A. Juels, and A. Oprea,“Proofs of Retrievability: Theory and Implementation,” Cryptology ePrint Ar chive , Repor t 2008/175,2008, http://eprint.iacr.org
- G. Ateniese, R. Burns, R. Curtmola, J.Herring, L. Kissner, Z. Peterson, and D.Song, “Provable Data Possession at Untrusted Stores,” Proc. Of CCS ’07, pp.598–609, 2007.
- G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. Of SecureComm ’08, pp. 1–10, 2008.
- T. S. J. Schwarz and E. L. Miller, “Store,Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage,” Proc.of ICDCS ’06, pp. 12–12, 2006.
- M. Lillibridge, S. Elnikety, A. Birrell, M.Burrows, and M. Isard, “A Cooperative Internet Backup Scheme,” Proc.of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41, 2003.
- K. D. Bowers, A. Juels, and A. Oprea,“HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Cryptology