scispace - formally typeset
Proceedings ArticleDOI

Data security model for Cloud Computing using V-GRT methodology

Reads0
Chats0
TLDR
A new model called V-GRT methodology which overcomes the basic problem of cloud computing data security and is presented with security vendor that eliminates the fear of misuse of data by the cloud service provider thereby improving data security.
Abstract
Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well understood. In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Clouds typically have single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. But there are also chances that the cloud service is not trust worthy, to overcome this problem. This paper introduces a new model called V-GRT methodology which overcomes the basic problem of cloud computing data security. We present the data security model of cloud computing with security vendor that eliminates the fear of misuse of data by the cloud service provider thereby improving data security.

read more

Citations
More filters
Book ChapterDOI

IoT Sensor-Based Smart Agricultural System

TL;DR: This research work proposes a cloud platform for smart agriculture data with wireless sensor network based on IOT, which can efficiently conquer the impulse of difficult and changing climate, the geographical disability, natural calamity, plagues and ailments about the crop.
Proceedings Article

Event-based isolation of critical data in the cloud.

TL;DR: TrustDraw provides secure storage of critical data like keys or passwords and allows to temporarily insert this data into a running virtual machine (VM) if required and improves security by allowing access to the critical data only if certain previously defined conditions are met.
Proceedings ArticleDOI

“Security-as-a-Service” for files in cloud computing — A novel application model

TL;DR: A new Security-as-a-Service based application model is proposed that offers encryption as a service to its consigners for assorted type of files and Comparative Analysis shows evidence of the efficacy of proposed pioneering application model.
Proceedings ArticleDOI

Hadoop security models - a study

TL;DR: A detailed survey about the various security mechanisms and methodologies used in the big data technique to enhance the system protection and enables a reliable platform in the storage of datasets.
Journal ArticleDOI

Data Refining and Transforming via Cloud Technology through Local Desktop

TL;DR: A novel optimization model has been proposed in which the cloud architecture is redefined with new RAM (FeRAM) and other external resources and thus a model OUT_OF_HARDDRIVE method is proposed.
References
More filters

A fully homomorphic encryption scheme

TL;DR: This work designs a somewhat homomorphic "boostrappable" encryption scheme that works when the function f is the scheme's own decryption function, and shows how, through recursive self-embedding, bootstrappable encryption gives fully homomorphic encryption.
Book ChapterDOI

The Decision Diffie-Hellman Problem

TL;DR: This paper surveys the recent applications of DDH as well as known results regarding its security, and describes some open problems in this area.
Journal ArticleDOI

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

TL;DR: This paper proposes a basic idea for the MRSE based on secure inner product computation, and gives two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models and further extends these two schemes to support more search semantics.
Book ChapterDOI

FADE: Secure Overlay Cloud Storage with File Assured Deletion

TL;DR: FADE as discussed by the authors is built upon standard cryptographic techniques, such that it encrypts outsourced data files to guarantee their privacy and integrity, and most importantly deletes files to make them unrecoverable to anyone (including those who manage the cloud storage) upon revocations of file access policies.
Proceedings Article

Enhanced data security model for cloud computing

TL;DR: This paper presents the data security model of cloud computing based on the study of the cloud architecture, and implements software to enhance work in a dataSecurity model for cloud computing.