Analysis of Modes of Data Security and Future Requirements for Cloud Based Storages
- Version
- Download 23
- File Size 308.11 KB
- File Count 1
- Create Date 24 May 2025
- Last Updated 24 May 2025
Analysis of Modes of Data Security and Future Requirements for Cloud Based Storages
Authors:
Gurpreet Singh 1, Ashoke kumar mahato 2
- Assistant professor, Department of Computer Science, St.Xavier’s College, Ranchi.
- H.O.D., Department of Mathematics and Ex. Dean of Science, D.S.P.M.U., Ranchi.
Abstract: Along with the advancements in technology, Cloud based storages are becoming a very popular method of data storage. With their growing popularity, concerns of security of data on clouds are also rising. At present, IaaS is the most commonly used deployment method of cloud computing. It requires capable enough encryption algorithms to safeguard the contents stored on cloud storages to prevent the malicious use of sensitive data.
Currently, identity based encryption (IBE), Data encryption standard (DES-256), Multi factor authentication (MFA) and Elliptic curve cryptography (ECC) are the most prominent methods of data security in cloud storages. In this paper, we are analyzing the working methods of these approaches and presenting a comparative study of them. Our objective is to find out the capabilities and shortcomings of these and further, we will examine the abilities and limits of these algorithms to meet the present requirements of data security.
Keywords: Cloud computing, IBE, MFA, ECC, DES-256, IaaS
Download