An Intensify approach of Data owner Dominant Model for Safeguard Data security in Cloud
Maninder Singh Bajwa, Himani, , ,
Cloud computing is the innovative trendy technology which diversified their role in whole world business but demerits of
cloud become an obstacle to opt this technology, So frequent enhancements are required to make this technology worthy. The vital
concerns are data security, data privacy, data leakage, integrity and data confidentiality due to which this mechanization lacks behind. To
solve these problems we proposed a model which intensifies data security and is based on data owner dominance. Encryption,
Obfuscation, HMAC and Dual authentication and access management techniques have been used which make this model trustworthy
and efficient for usage.
Maninder Singh Bajwa,Himani."An Intensify approach of Data owner Dominant Model for Safeguard Data security in Cloud". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 04,pp.260-263, April - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I410.pdf,
Keywords : Cloud Computing, Data Owner Dominant, Data Security, Hash Code, Encryption, Obfuscation.
 Ayad F. Barsoum et al “Provable Multicopy Dynamic Data Possession in Cloud Computing Systems”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 3, MARCH 2015.
 Chang Liu et. al. “MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud”, IEEE TRANSACTIONS ON COMPUTERS.
 Cindhamani.J et al “An enhanced data security and trust management enabled framework for cloud computing systems”, 5th ICCCNT – 2014.
 Dharmendra S. Raghuwanshi “MS2: Practical Data Privacy and Security Framework for Data at Rest in Cloud”, 2014 IEEE.
 Dr. L. Arockiam et al “Efficient Cloud Storage Confidentiality to Ensure Data Security”, 2014 International Conference on Computer Communication and Informatics, ICCCI -2014.
 Eman M.Mohamed et al “Enhanced Data Security Model for Cloud Computing”, The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May, Cloud and Mobile Computing Track.
 Hu Shuijing “Data security: the challenges of cloud computing”, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.
 Jingwei Li et.al. “Secure Auditing and Deduplicating Data in Cloud”, 2015 IEEE Transactions on Computers.
 LiMa et. al. “Chances and Challenges Confronting Securities Industry and the Countermeasures in Big Data and Cloud Computing Era”, ICCSE 2014.
 M. Sugumaran et.al. “An Architecture for Data Security in Cloud Computing”, 2014 World Congress on Computing and Communication Technologies.
 Mazhar Ali et al “SeDaSC: Secure Data Sharing in Clouds”, IEEE SYSTEMS JOURNAL 2015.
 Neelu Sinha et.al. “Cloud Computing Security, Data, And Performance Issues”, WOCC 2014.
 Sandha et.al. “Study on Data Security Mechanism in Cloud Computing”, 2nd International Conference on Current Trends in Engineering and Technology, ICCTET’14.
 Taeho Jung et. al “Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 1, JANUARY 2015.
 Tao Jiang et al “Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation”, 10.1109/TC.2015.238995 5, IEEE Transactions on Computers.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.