2018
DOI: 10.30534/ijatcse/2018/01712018
|View full text |Cite
|
Sign up to set email alerts
|

Security Protocol for Data Transmission in Cloud Computing

Abstract: Security is one of the significant challenges which limit users from taking the full advantage of cloud computing. Accordingly, many users have concerns about saving their sensitive data in insecure place. Therefore, we need a protocol that verifies confidentiality, authenticity, integrity, and non-repudiation of data transmission in the cloud. In this paper we will present a protocol that help to secure data access during transmission. Accordingly, users can send their data to the cloud safely and quickly. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 0 publications
0
14
0
Order By: Relevance
“…Cloud computing has introduce new paradigm in computing and data centre deployment [13], and hosted services on the Internet are often associated with wide-ranging term of cloud computing [14] [27]. Generally cloud services has application programming interface (API) based on SOAP or REST standard for easy interaction with other web application [23].…”
Section: Cloud Computing Platform and Virtualizationmentioning
confidence: 99%
See 3 more Smart Citations
“…Cloud computing has introduce new paradigm in computing and data centre deployment [13], and hosted services on the Internet are often associated with wide-ranging term of cloud computing [14] [27]. Generally cloud services has application programming interface (API) based on SOAP or REST standard for easy interaction with other web application [23].…”
Section: Cloud Computing Platform and Virtualizationmentioning
confidence: 99%
“…The computing resources such as CPU, memory and storage on the cloud are basically shared among multiple hosts or virtual machine [27]; therefore it is important to have a data protection scheme to protect data confidentiality, Table 1 below shows three types of data which need to be protected in the cloud deployment. 1 shows the type of data with its corresponding risk level of confidentiality breach.…”
Section: Data Protection In Cloud Computingmentioning
confidence: 99%
See 2 more Smart Citations
“…Database-as-a-Service (DaaS) allows a third party service provider to host the database for the clients, to store and access the cloud databases with the adequate storage resource and low infrastructure cost [1,2]. The third party provider is in charge of the administrative and maintenance tasks.…”
Section: Introductionmentioning
confidence: 99%