Mostly of our information is deposited on local network systems using servers which might be grouped and sharing storage. This method has required a lot of time period to be established into established design, as well as offers quite low redundancy when deployed right. As a fresh revolving technology i.e. cloud computing, has displayed up huge challenging consideration as well as speedily is changing the direction of the technology landscape. In our work we have workedusing enhanced approach of security of the content which is going to be stored at cloud computing platform. Nowadays the cloud computing is a new-fangled space which we all anticipating to be safe and secure. Nevertheless we would not overlook the future phases of the hacking frameworks as well as their methodologies. By keeping the future aspects in mind our work has distributed the data into distinctive server stages so that in any condition if some body attempts to acquire the information, that person might have to access all the platforms provided for the data storage. This paper audits the brief study on multimedia cloud computing perspectives and described some challenges, some security issues in cloud computing, along with security algorithms.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. (2009, Feb. 10). Above the clouds: A Berkeley view of cloud computing. EECS Dept., Univ. California, Berkeley, No. UCB/EECS-2009-28 [Online]. Available: http://radlab. cs.berkeley.edu/
R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities,” in Proc.10th IEEE Int. Conf. High Performance Computing and Communications, 2008, pp. 5–13.
R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for deliveringit services as computing utilities,” in Proc. 10th IEEE Int. Conf. High Performance Computing and Communications,2008, pp. 5–13.
Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. (2009, Feb. 10). Above the clouds: A Berkeley view ofcloud computing. EECS Dept., Univ. California, Berkeley, No. UCB/EECS-2009-28[Online]. Available:http://radlab.cs.berkeley.edu/
VikasGoyal, Dr.Chander Kant, “Security Issues for Cloud Computing”International Journal ofEngineering Sciences, ISSN : 2229-6913, September2011,4, pp. 274-282..
W. Stallings, Cryptography and network security: principles and practice: Prentice Hall, 2010.
RajnishChoubey, Rajshree Dubey and Joy Bhattacharjee, “A Survey on Cloud Computing Security, Challenges and Threats”, International Journal on Computer Science and Engineering (IJCSE), pp:1227 – 1231, Vol. 3 No. 3 Mar 2011, ISSN : 0975-3397
FarhadSoleimanianGharehchopogh “ Mobile Cloud Computing: Security Challenges for Threats Reduction” International Journal of Scientific & Engineering Research, Volume 4, Issue 3, March‐2013 ISSN 2229‐5518
Vahid Ashktorab2, Seyed Reza Taghizadeh1 “Security Threats and Countermeasures in Cloud Computing” International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Mr. D. Kishore Kumar “Cloud Computing: An Analysis of Its Challenges & Security Issues” International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012 www.ijcsn.org ISSN 2277-5420
K.S.Suresh “ Security Issues and Security Algorithms in Cloud Computing” International Journal of Advanced Research in Computer Science and Software Engineering
Dr.A.Padmapriya, M.C.A., M.Phil., Ph.DP.Subhasri, (M.Phil, Research Scholar) “Cloud Computing: Security Challenges & Encryption Practices” Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
Leena Khanna “ Cloud Computing: Security Issues And Description Of Encryption Based Algorithms To Overcome Them” Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
C.N. Höfer and G. Karagiannis, “Cloud computing services: taxonomy and comparison”, Internet ServAppl (2011)
F.A.Alvi, B.S.Choudary, N.Jaferry,”Review on cloud computing security issues & challenges”, iaesjournal.com, vol (2) (2012)
MANDEEP KAUR, MANISH MAHAJAN, “using encryption algorithms to enhance the data security in cloud computing, “International journal of communication and computer technologies”, ISSN Number: 2278-9723.
Sara Qaisar and KausarFiaz Khawaja,” Cloud Computing:Network/Security Threats And Countermeasures”, Ijcrb, January 2012 Vol 3, No 9.
Priyanka Arora, Arun Singh and HimanshuTyagi,“Evaluation and Comparison of Security Issues on Cloud Computing Environment”, (WCSIT) ISSN: 2221-0741 Vol. 2, No. 5, p.p (179-183), 2012.
Cloud Computing, Multimedia, Internet, AES, RSA, Security.