IDEAS home Printed from https://ideas.repec.org/a/igg/jcac00/v9y2019i4p21-36.html
   My bibliography  Save this article

Ensure Hierarchal Identity Based Data Security in Cloud Environment

Author

Listed:
  • Shweta Kaushik

    (JIIT Noida, Noida, India)

  • Charu Gandhi

    (JIIT Noida, Noida, India)

Abstract

Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled. Here, the owner's data is stored at a distributed data centre, which are responsible for its security constraints such as access control and data transmission to user. As the owner does not have physical access on their own data, the data centres are not trustworthy, this resulted in the cloud data security demand. Today, many cloud service providers (CSPs) are using the asymmetric and public key cryptography (PKG) for authenticating and data security purposes using the digital identity of the user. To this end, this article focuses on cloud data storage and its delivery to authorized user. For this purpose, a hierarchal identity-based cryptography method is used for data security and checking the data integrity, in order to make sure that there is no alteration or modification done by a malicious attacker or CSP for its own benefit.

Suggested Citation

  • Shweta Kaushik & Charu Gandhi, 2019. "Ensure Hierarchal Identity Based Data Security in Cloud Environment," International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 9(4), pages 21-36, October.
  • Handle: RePEc:igg:jcac00:v:9:y:2019:i:4:p:21-36
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCAC.2019100102
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Huang, Zhi Meng & Liang, Yan Min, 2020. "Digital protection and inheritance of ancient villages in southwest minority areas under the strategy of rural revitalization," Technological Forecasting and Social Change, Elsevier, vol. 160(C).
    2. Jin, Xin & Zuo, Xiangbin & Dong, Xiaoli & Dong, YanJiao & Ding, Huanhuan, 2021. "Analysis of the policy guarantee mechanism of rural infrastructure based on deep learning," Technological Forecasting and Social Change, Elsevier, vol. 166(C).
    3. Kumar, Nikhil & Poonia, Vikas & Gupta, B.B. & Goyal, Manish Kumar, 2021. "A novel framework for risk assessment and resilience of critical infrastructure towards climate change," Technological Forecasting and Social Change, Elsevier, vol. 165(C).
    4. Islam, Md Rafiqul & Liu, Shaowu & Biddle, Rhys & Razzak, Imran & Wang, Xianzhi & Tilocca, Peter & Xu, Guandong, 2021. "Discovering dynamic adverse behavior of policyholders in the life insurance industry," Technological Forecasting and Social Change, Elsevier, vol. 163(C).
    5. Chaudhary, Pooja & Gupta, Brij B. & Chang, Xiaojun & Nedjah, Nadia & Chui, Kwok Tai, 2021. "Enhancing big data security through integrating XSS scanner into fog nodes for SMEs gain," Technological Forecasting and Social Change, Elsevier, vol. 168(C).
    6. Pang, Sulin & Xia, Lianhu, 2021. "Automatic classification and identification algorithms for single-environment risk and their application in social changes," Technological Forecasting and Social Change, Elsevier, vol. 166(C).
    7. Hinge, Gilbert & Surampalli, Rao Y. & Goyal, Manish Kumar & Gupta, Brij B. & Chang, Xiaojun, 2021. "Soil carbon and its associate resilience using big data analytics: For food Security and environmental management," Technological Forecasting and Social Change, Elsevier, vol. 169(C).
    8. Anupama Mishra & Neena Gupta & B. B. Gupta, 2021. "Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 77(1), pages 47-62, May.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jcac00:v:9:y:2019:i:4:p:21-36. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.