28-05-2014, 02:06 PM
Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing
Implementing Digital Signature.pdf (Size: 111.56 KB / Downloads: 49)
Abstract
The cloud is a next generation
platform that provides dynamic resource
pools, virtualization, and high availability.
Today, we have the ability to utilize
scalable,
distributed
computing
environments within the confines of the
Internet, a practice known as cloud
computing. Cloud computing is the Concept
Implemented to decipher the Daily
Computing Problems, likes of Hardware
Software and Resource Availability
unhurried by Computer users. The cloud
Computing provides an undemanding and
Non ineffectual Solution for Daily
Computing. The prevalent Problem
Associated with Cloud Computing is the
Cloud security and the appropriate
Implementation of Cloud over the Network.
In this Research Paper, we have tried to
assess Cloud Storage Methodology and
Data Security in cloud by the
Implementation of digital signature with
RSA algorithm
Introduction
Cloud computing is the Internet-
based development and is used in computer
technology. It has become an IT buzzword
for the past a few years. Cloud computing
has been often used with synonymous terms
such as software as a service (SaaS), grid
computing, cluster computing, autonomic
computing, and utility computing . SaaS is
only a special form of services that cloud
computing provides. Grid computing and
cluster computing are two types of
underlying computer technologies for the
development of cloud computing.
It is often difficult to define the
cloud computing. Computing is a virtual
pool of computing resources. It provides
computing resources in the pool for users
through internet. It provides a mandatory
application programming environment. It
can deploy, allocate or reallocate computing
resource dynamically and monitor the usage
of resources at all times
Cloud Security Challenges
Although virtualization and cloud
computing can help companies accomplish
more by breaking the physical bonds
between an IT infrastructure and its users,
heightened security threats must be
overcome in order to benefit fully from this
new computing paradigm. This is
particularly true for the SaaS provider.
Some security concerns are worth more
discussion. With the cloud model, you lose
control over physical security. In a public
cloud, you are sharing computing resources
with other companies. In a shared pool
outside the enterprise, you don’t have any
knowledge or control of where the
resources run. Exposing your data in an
environment shared with other companies
could give the government “reasonable
cause” to seize your assets because another
company has violated the law. Simply
because you share the environment in the
cloud, may put your data at risk of seizure.
Storage services provided by one cloud
vendor may be incompatible with another
vendor’s services should you decide to
move from one to the other. Vendors are
known for creating what the hosting world
calls “sticky services”—services that an end
user may have difficulty transporting from
one cloud vendor to another.
Conclusions
Among the many IT giants driven
by trends in cloud computing has not
doubtful. It gives almost everyone has
brought good news. For enterprises, cloud
computing is worthy of consideration and
try to build business systems as a way for
businesses in this way can undoubtedly
bring about lower costs, higher profits and
more choice; for large scale industry, After
the financial turmoil will be the cost of
infrastructure for large-scale compression
seems likely; developers, when in the face
of cloud computing, through the PaaS
model can effectively improve their own
capacity, Therefore, the impact of cloud
computing on the ISV is the largest of the
many roles; for engineers and developers
are concerned.