Efficient Technique for Data Management and Security Over the Cloud

Authors

  • Dattatray G. Takale Assistant Professor, Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India
  • Krishna Garg Research Intern, Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India
  • Hamza Khanji Research Intern, Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India
  • Manoj Kalasgonda Research Intern, Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, Maharashtra,
  • Kiran Khamker Research Intern, Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, Maharashtra,
  • Maryna Nani Research Intern, Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India

DOI:

https://doi.org/10.48001/jowacs.2024.2118-24

Keywords:

Cloud computing, Cloud security, Data breaches, Data security, Data theft protection, Data transmission, Emerging trends, Future directions, Misconfigurations, Quantum computing, Server security

Abstract

In today’s scenario of computing paradigm, the cloud framework has become a significant solution on peak of virtualization for the utilization of computing models. However, the model has the latent to influence users and organizations; there are several security issues over shared data. In existing models for cloud data security, several considerations are made. Still, there is a requirement for ensuring cloud storage security with Third Party Auditing and distributed accountability. Today, users work with many types of data whether it be text, audio, video, or picture file. Storing of such data is of crucial importance. The current trend that provides with easy storage and access to our data is cloud.

Downloads

Download data is not yet available.

References

Alshabandar, R., Hussain, A., Keight, R., & Khan, W. (2020, July). Students performance prediction in online courses using machine learning algorithms. In 2020 International Joint Conference on Neural Networks (IJCNN) (pp. 1-7). IEEE.

https://doi.org/10.1109/IJCNN48605.2020.9207196.

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58. https://dl.acm.org/doi/fullHtml/10.1145/1721654.1721672.

Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599-616. https://doi.org/10.1016/j.future.2008.12.001,

Cloud, H. (2011). The nist definition of cloud computing. National Institute of Science and Technology, Special Publication, 800(2011), 145. https://oss.oracle.com/~wcoekaer/docs/linuxtag.pdf.

Dutta, A., Peng, G. C. A., & Choudhary, A. (2013). Risks in enterprise cloud computing: The perspective of IT experts. Journal of Computer Information Systems, 53(4), 39-48. https://doi.org/10.1080/08874417.2013.11645649.

Hariharasitaraman, S., & Balakannan, S. P. (2019). A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud. Journal of Ambient Intelligence and Humanized Computing, 1-15.

https://doi.org/10.1007/s12652-019-01412-0.

Kadam, S. U., Dhede, V. M., Khan, V. N., Raj, A., & Takale, D. G. (2022). Machine learning method for automatic potato disease detection. Neuro Quantology, 20(16), 2102-2106. https://doi.org/10.48047/NQ.2022.20.16.NQ880300.

Kadam, S. U., Khan, V. N., Singh, A., Takale, D. G., & Galhe, D. S. (2022). Improve the performance of non-intrusive speech quality assessment using machine learning algorithms. Neuro Quantology, 20(10), 12937. https://doi.org/10.14704/nq.2022.20.10.NQ551254.

Mandala, D., Du, X., Dai, F., & You, C. (2008). Load balance and energy efficient data gathering in wireless sensor networks. Wireless Communications and Mobile Computing, 8(5), 645-659. https://doi.org/10.1002/wcm.492.

Mell, P. M., & Grance, T. (2011). Sp 800-145. the nist definition of cloud computing. National Institute of Standards & Technology, Gaithersburg, MD, United States, Tech. Rep. https://dl.acm.org/doi/book/10.5555/2206223.

Mittal, N., Singh, U., & Sohi, B. S. (2017). A stable energy efficient clustering protocol for wireless sensor networks. Wireless Networks, 23, 1809-1821. https://doi.org/10.1007/s11276-016-1255-6.

Raut, R., Borole, Y., Patil, S., Khan, V., & Takale, D. G. (2022). Skin disease classification using machine learning algorithms. NeuroQuantology, 20(10), 9624-9629. https://doi.org/10.14704/nq.2022.20.10.NQ55940.

Reddy, Y. (2018, May). Big data processing and access controls in cloud environment. In 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing,(HPSC) and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 25-33). IEEE. https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00019.

Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009, November). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 199-212). https://doi.org/10.1145/1653662.1653687.

Shende, M. S. S. (2023). A review on wireless sensor network: Its applications and challenges . International Journal of Computational Research in Engineering and Science, 1(01), 18-25. https://ijcres.org/index.php/1/article/view/8.

Suguna, D., & Elangovan, K. (2014). Fault node recovery algorithm to enhance the lifetime of a wireless sensor network. International Journal Of Computer Science And Mobile Applications. 2(8), 6-14.

https://www.ijcsma.com/articles/fault-node-recovery-algorithm-to-enhance-the-lifetime-of-a-wireless-sensor-network.pdf.

Takale, D. D., & Khan, V. (2023). Machine learning techniques for routing in wireless sensor network. International Journal of Research And Analytical Reviews, 10(1). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4394967.

Takale, D. D., Sharma, D. Y. K., & SN, P. (2019). A review on data centric routing for wireless sensor network. Journal of Emerging Technologies and Innovative Research (JETIR), 6(1). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4416491.

Takale, D. G., Gunjal, S. D., Khan, V. N., Raj, A., & Guja, S. N. (2022). Road accident prediction model using data mining techniques. NeuroQuantology, 20(16), 2904. https://doi.org/10.48047/NQ.2022.20.16.NQ880299.

Takale, D. G., Mahalle, P. N., Sakhare, S. R., Gawali, P. P., Deshmukh, G., Khan, V., ... & Maral, V. B. (2023, August). Analysis of clinical decision support system in healthcare industry using machine learning approach. In International Conference on ICT for Sustainable Development (pp. 571-587). Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-99-5652-4_51.

Published

2024-01-25

How to Cite

Dattatray G. Takale, Krishna Garg, Hamza Khanji, Manoj Kalasgonda, Kiran Khamker, & Maryna Nani. (2024). Efficient Technique for Data Management and Security Over the Cloud. Journal of Web Applications and Cyber Security (e-ISSN: 2584-0908), 2(1), 18–24. https://doi.org/10.48001/jowacs.2024.2118-24

Issue

Section

Original Research Articles