Papers

Title: A Survey: Enterprise Secure Data Exchange Management System
Year of Publication: 2018
Publisher: International Journal of Computer Systems (IJCS)
ISSN: 2394-1065
Series: Volume 05, Number 3, March 2018
Authors: Pratik Mahajan , Suraj Mane, Tripti Mishra, Neeta Mukane, Amit Chougule

Citation:

Pratik Mahajan , Suraj Mane, Tripti Mishra, Neeta Mukane, Amit Chougule, "A Survey: Enterprise Secure Data Exchange Management System", In International Journal of Computer Systems (IJCS), pp: 1-3, Volume 5, Issue 3, March 2018. BibTeX

@article{key:article,
	author = {Pratik Mahajan , Suraj Mane, Tripti Mishra, Neeta Mukane, Amit  Chougule},
	title = {A Survey: Enterprise Secure Data Exchange Management System},
	journal = {International Journal of Computer Systems (IJCS)},
	year = {2018},
	volume = {5},
	number = {3},
	pages = {1-3},
	month = {March}
	}


Abstract

Cloud computing is simply defined as services such as servers, storage, database and much more over the internet. This paper surveys too many running research related project on single cloud security using Shamir’s Secrete Sharing Algorithm and Advanced Encryption Standard Algorithm for file encryption and decryption. Focus of this project is to use single cloud, provide data security and reduce security risk. Main approach is to use multiple database using the concept of secrete keys and encrypt the data which is stored in database, so it would be impossible to decrypt the data without those keys, thus reducing the possibility of hacking. The combination of main keys and randomly generated keys decided previously can only crack the data. This project would achieve four goals of security that is Authentication, Authorization, Confidentiality and Integrity.

References

[1] Masher Ali, Student Member, IEEE, Breathy Dhamotharan, Eraj Khan, Samee U. Khan, Senior Member, IEEE, Athanasius V. Vasilakos, Senior Member, IEEE, Keqin Li, Fellow, IEEE, and Albert Y. Zomaya, Fellow,” SeDaSC: Secure Data Sharing in Clouds”, IEEE.,Volume No 04,Issue 2014.
[2] Qian Wang , Cong Wang, Kui Ren , “Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transactions on Parallel and Distributed Systems, Volume: 22, Issue: 5, Page(s): 847 – 859, May 2011.
[3] Pradnya B. Godhankatal,” Review of Cloud storage security and cloud computing Challenges”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1), 2014, 528-533.
[4] Monica G. Charate1, Dr. Savita R. Bhosale,” Cloud Computing Security Using Shamir’s Secrete Sharing Algorithm from Single Cloud to Multi Cloud”, Volume No 03, Special Issue No. 01, April 2015.
[5] M.Muhila, U.Hemanth Krishna a, R.Kishore Kumar a, E. A. Mary Anita, "Securing Multi-Cloud using Secret Sharing Algorithm”, Volume No. (04) Issue 2015.
[6] Md Kausar Alam, Sharmila Banu K, "An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds”, Volume 3, Issue 4, April 2013.
[7] Iqra Basharat, Farooque Azam, Abdul Wahab Muzaffar, “Database Security and encryption: A survey Study”, In International Journal of Computer Applications, Volume 47– No.12, June 2012.
[8] Taha M. Alfaqih, Mohammad Mehedi Hassan, “GIS Cloud: Integration between Cloud Things and Geographic Information Systems (GIS) Opportunities and Challenges”, In International Journal of Computer Systems (IJCS), Volume 3, Issue 5 Pages 360-365, 2016.
[9] Priyanka Porwal, Ankit Kumar, “Cloud Security Countermeasures against Distributed Denial of Service Attacks”, In International Journal of Computer Systems, Volume 02, Issue 11, November, pages: 494-499, 2015


Keywords

Cloud Computing, Data Security, Cryptography, Encryption, File Decryption.