ENCHANCEMENT OF SECURITY OF FIREWALL BASED CLOUD SERVER USING CUSTOMIZED DATA ENCRYPTION STANDARD

Authors

  • Poonam Verma Research Scholar, Department of CSA, CDLU Sirsa
  • Monika Bansal Assistant Professor , Department of CSA, CDLU Sirsa

Keywords:

Cloud Computing, Deployment Models, Threats, Technologies

Abstract

Cloud computing has grabbed the spotlight in the year 2013 at a conference in San Francisco, with vendors providing plenty of products and services that equip IT with controls to bring order to cloud chaos. Cloud computing trend is increasing rapidly so to make cloud computing more popular the very first step for the organization is to identify exact area where the cloud related threats lie. At an unusual pace, cloud computing has transformed business and government. And this created new security challenges. The development of the cloud service model provide business –supporting technology in a more efficient way than ever before the shift from server to service based technology brought a drastic change in computing technology. However these developments have created new security vulnerabilities, including security issues w hose full impressions are still rising. This paper presents an overview and study of cloud computing, with several security threats, security issues, currently used cloud technologies and security solutions.

References

Logik Bomb: Hacker's Encyclopedia (1997)

sHafner, Katie; Markoff, John (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster. ISBN 0-671-68322-5.

Sterling, Bruce (1992). The Hacker Crackdown. Bantam. ISBN 0-553-08058-X.

Slatalla, Michelle; Joshua Quittner (1995). Masters of Deception: The Gang That Ruled Cyberspace. HarperCollins. ISBN 0-06-017030-1.

Dreyfus, Suelette (1997). Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier. Mandarin. ISBN 1-86330-595-5.

Verton, Dan (2002). The Hacker Diaries : Confessions of Teenage Hackers. McGraw-Hill Osborne Media. ISBN 0-07-222364-2.

Thomas, Douglas (2002). Hacker Culture. University of Minnesota Press. ISBN 0-8166-3345-2.

Taylor, Paul A. (1999). Hackers: Crime in the Digital Sublime. Routledge. ISBN 978-0-415-18072-6.

Levy, Steven (2002). Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age. Penguin. ISBN 0-14-024432-8.

Ventre, Daniel (2009). Information Warfare. Wiley - ISTE. ISBN 978-1-84821-094-3.

Bhushan Lal Sahu,Rajesh Tiwari, Journal of Advanced Research in Computer Science and Software Engineering 2(9) (2012) 33-37.

Downloads

Published

30-09-2016

How to Cite

Poonam Verma, & Monika Bansal. (2016). ENCHANCEMENT OF SECURITY OF FIREWALL BASED CLOUD SERVER USING CUSTOMIZED DATA ENCRYPTION STANDARD. International Journal for Research Publication and Seminar, 7(6), 60–65. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/910

Issue

Section

Original Research Article