Academic Journals Database
Disseminating quality controlled scientific knowledge

The Effective and Efficient Security Services For Cloud Computing

Author(s): Sambhaji Sarode | Deepali Giri | Khushbu Chopde

Journal: International Journal of Computer Applications
ISSN 0975-8887

Volume: 34;
Issue: 9;
Start page: 42;
Date: 2011;
Original page

Keywords: Cloud computing | Encryption and Decryption cloud services | Data privacy protection | One Time Password (OTP) | Service Level Agreements (SLA)

The concept of cloud computing is a very vast concept which is very efficient and effective security services. The cloud computing methodology is a conceptual based technology which is used widely now a day. But in data privacy protection and data retrieval control is one of the most challenging research work in cloud computing, because of users secrete data which is to be stored by user. An enterprise usually store data in internal storage and then tries to protect the data from other outside source. They also provide authentication at certain specific level. To overcome this limitation, we are presenting some approaches that do not require complete dependency on the external security provider. In cloud computing, the data will be stored in storage provided by service providers which has no control of user. Service provider must provides the authentication for valid user otherwise the security must reduce and the cloud computing system may collapse. It's a service provider's responsibility to save the end user's private data. For the above issues regarding security and privacy, this paper implies some efficient ways to overcome the limitations and drawbacks of cloud computing. This paper mainly proposes the core concept of secured cloud computing i.e. it suggests the cloud computing based on separate encryption and decryption services from the storage service. This paper introduces a user interface model i.e. Customer Relationship Management 'CRM'. The CRM is actually a connecting application which connects user to any system. So we purposefully uses CRM for user interface. A CRM service is described in this paper as an example to proposed business model and usability for end user. This service consists of three cloud systems, which are an encryption, and decryption system, a storage system, and a CRM application system. One service provider operates the encryption and decryption system while other providers operate the storage Even for security and data integrity we supposed to implement the One Time Password Authentication 'OTP' including email updates and application systems, according to the core concept of the proposed computing model.
Save time & money - Smart Internet Solutions     

Tango Rapperswil
Tango Rapperswil