Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing

Authors

  • Kofi Immanuel Jones Department Computer Science and Information Technology, Jain University, Bengaluru, Karnataka, India
  • R. Suchithra Department Computer Science and Information Technology, Jain University, Bengaluru, Karnataka, India

DOI:

https://doi.org/10.59461/ijdiic.v2i1.34

Keywords:

Cloud Security , Encryption , Message authentication code , Virtualization , Secured socket layer

Abstract

This paper discusses different techniques and specialized procedures which can be used to effectively protect data from the owner to the cloud and then to the user. The next step involves categorizing the data using three encryption parameters provided by the user, which are Integrity, Availability, and Confidentiality (IAC). The data is secured through various methods such as SSL and MAC protocols to ensure data integrity checks, searchable encryption, and splitting the data into three parts for cloud storage. Dividing the data into three portions not only enhances security but also facilitates easier access. Access to the encrypted data requires the user to provide the login information and password of the owner. This paper also studies critical security issues like unauthorized servers, brute force attacks, threats from cloud service providers, and loss of user identity and password.

Downloads

Published

24-03-2023

How to Cite

Kofi Immanuel Jones, & R. Suchithra. (2023). Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing. International Journal of Data Informatics and Intelligent Computing, 2(1), 11–31. https://doi.org/10.59461/ijdiic.v2i1.34

Issue

Section

Regular Issue