DECIMAL ATTRIBUTE BASED ENCRYPTION IN CLOUD SERVER

Authors

  • Akshita Saxena Research Scholar, KIST Bhopal,M.P.
  • Nitin Chaudhary HOD Department of CS , KIST Bhopal,M.P.

Keywords:

scalable, isolation, infrastructure

Abstract

This Research presents a comparative study of DECIMAL ATTRIBUTE BASED ENCRYPTION in cloud server and the security issues associated with those systems. In today’s networked world, computers rarely work in isolation. They collaborate with each other for the purpose of communication, processing, data transfer, storage etc., when systems work in this collaborative fashion with other systems that are geographically scattered over wide distance it is commonly known as a distributed system. In literature, researchers have used diverse definitions to outline what a distributed system is Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure and economical. The motivation for cloud computing was initially driven by large scale resource intensive government application, that require more computational, network and storage resources then a single computer, cloud provides in a single administrative domain. Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage at low cost.

References

.leenerP traB , ASR eht ta kcarT ’srehpargotpyrC ehT“

”ecnerefnoc, 2005, retupmoc ni seton erutceL

ecneicS3376 ,springer-Verlag ,pp .29-43 ,extended version :http//:eprint .iacr.org/2004/222 ./

.]Ilango Sriram ,”Distributed ,Parallel and Cluster computin”g, 2009, aSimulation Tool Exploring Cloud-Scale Data Centres, In: CloudCom 2009, LNCS 5931, pp. 381-392, 2009

.]S ,esevoneG erotava”Akamai Introduces Cloud-Based Firewall Provides a scalable edge defense system for blocking Web application attacks in the cloud”, 2009. http://cloudcomputing.sys-con.com/node/1219023.

ecnarg miT dna llim reteP .], “The NIST Definition of Cloud Computing”, 2011, National Institute of Standards and Technology ,Gaitherbsburg,MD 20899-8930, noitacilbuP laicepS TSIN800-145.

remsseM nellE .], “New security demands arising for virtualization, cloud computing”, 2011, http://www.networkworld.com/article/2178628/virtualization/gartner--new-security-demands-arising-for-virtualization--cloud-computing.html

.]SumedhaKaushik dnaAnkurSinghal ,”Network Security Using Cryptographic Techniques ”2012 ,

volume 2, eussI12.

. Charles Miers, Fernando Redigolo dna Marcos Simplicio ,”A quantitative analysis of current security concerns and solutions for cloud computing“ , 2012 , Journal of Cloud Computing: Advances, Systems and Applications doi:10.1186/2192-113X-1-11 The electronic version of this article is the complete one and can be found online at:http://www.journalofcloudcomputing.com/content/1/1/11 ]

[. Rabi Prasad Padhay, ”An Enterprise Cloud Model for Optimizing IT Infrastructure“ , 2012 , International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.1, No.3, pp. 123~133 ISSN: 2089-3337ttp://iaesjournal.com/online/index.php/ IJ-CLOSER

Downloads

Published

30-09-2016

How to Cite

Akshita Saxena, & Nitin Chaudhary. (2016). DECIMAL ATTRIBUTE BASED ENCRYPTION IN CLOUD SERVER. International Journal for Research Publication and Seminar, 7(6), 97–102. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/916

Issue

Section

Original Research Article