##plugins.themes.academic_pro.article.main##

Abstract

This research focuses on making the cloud more secure for sharing data. The need of more storage space to hold all your digital property is solved by the cloud storage. But the question arises that all your personal data is safe over the internet? Passwords can be hacked; data can be decrypted by Cloud Server. So for building users’ trust in the cloud storage we present a model that provides multi-layer encryption.  The cloud has its own certificate store but in our model we present an idea that enables user’s data not to be viewed by Cloud servers but only users and the ones whom they allow access. The users’ can buy the certificates from a company, any third party that is not involved with the Cloud Storage service. Users encrypt the data through their certificates and then share the data on the cloud. The cloud is considered safe and it is the need of the time to have large storage space for your digital property but we present a way to eliminate the threat in cloud computing.

Keywords – Certificate, Encryption, Public Key Infrastructure (PKI), Certification Authority (CA), Domain Controller.  

##plugins.themes.academic_pro.article.details##

How to Cite
Ijaz, I., Shahzadi, A., Riaz, K., & Sabir, S. (2014). A Framework for Data Storage Cloud to Provide Security. International Journal of Emerging Trends in Science and Technology, 1(06). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/280

References

1. Yanjiang Yang and Youcheng Zang, “A generic scheme for secure data sharing in cloud”, International Conference on parallel processing workshops, 2011:5
2. Zhusong Liu, “A secure anonymous Identity based access control over cloud data”, School of Computers, Guangdong University of Technology, China, Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013:7
3. Preeti Garg, M.Tech CSE Scholar, Dr. Vineet Shanna ,Professor Dept. of CSE , “An Efficient and Secure Data Storage in Mobile Cloud Computing. Through RSA and Hash Function” , KIET Ghaziabad, International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 :8
4. “Cryptographic Hash Function” , 5thAugust 2014, http://en.wikipedia.org/wiki/Cryptographic_hash_function
5. Imran Ijaz, "Design and Implementation of PKI (For Multi Domain Environment)," International Journal of Computer Theory and Engineering vol. 4, no. 4, pp. 505-509, 2012.
6. Z. Javaid and I. Ijaz, "Secure user authentication in cloud computing " in Information & Communication Technologies (ICICT), 2013 5th International Conference, Karachi Pakistan, 2013, pp. 1 – 5.
7. Imran Ijaz, “Securing user Authentication through Customized X.509 in Cloud Computing”, International Journal of Soft Computing and Engineering (IJSCE), Volume-4, Issue-3, July 2014, pp. 90-94.