Enforcing Data Security, Load Balancing And Auditing In Cloud Computing


  • Nikhitha K Nair
  • Navin K S
  • Soya C. S


Cloud Computing, Dual Security, Load Balancing, Third Party Auditor


Cloud computing is one of the emerging technologies that provide users with efficient storage and easy sharing of resources in a single platform. With the advent of this drastic technology, users became active in performing their applications with sharing with other use. This technology also brought in front the issues relating to the security, privacy and confidentiality. In this paper, proposed system focuses on performing dual security using encryption schemes, auditing using third party auditor and load balancing through agents in a single platform.


N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," Proc. IEEE INFOCOM, pp. 829-837, Apr, 2013.

Cong Wang, Ning Cao, Kui Ren and Wenjing Lou,†Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data†, IEEE Transactions on Parallel and Distributes Systems ,Vol.23, NO.8, AUGUST 2012.

S. Kamara and K. Lauter,“Cryptographic cloud storage,†in RLCPS, January 2010, LNCS.Springer, Heidelberg.

Ankatha Samuyelu Raja and Vasanthi A, “Secured Multi-keyword Ranked Search over Encrypted Cloud Data “, International Journal of Advanced Research in Computer Science and Software Engineering-Volume 2, Issue 10, October 2012.

Zhiyong Xu, Wansheng Kang, Ruixuan Li, KinChoong Yow, and Cheng-Zhong Xu,“Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloudâ€, IEEE 18th International Conference on Parallel and Distributed Systems.

William Stallings,â€Cryptography and Network Securityâ€, 4/E. Pearson Education India, 2006.

R.G.Rajan, V.Jeyakrishnan, “A Survey on Load Balancing in Cloud Computing Environmentsâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 12, December 2013.

N. Sran, N. Kaur, “Comparative Analysis of Existing Load Balancing Techniques in Cloud Computingâ€, International Journal of Engineering Science Invention ,Volume 2 Issue 1, PP.60-63,ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726, January. 2013

Wang, S. C., Yan, K. Q., Liao, W. P. & Wang, S. S. “Towards a load balancing in a three level cloud computing networkâ€, Proceedings of 3rd International Conference on Computer Science and Information Technology (ICCSIT), IEEE, July, 2010, 108-113.

Randles, M., Lamb, D., Bendiab, A. T. “A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing “, IEEE 24th International Conference on Advanced Information Networking and Applications Workshops 978-07695-4019-1/10, 2010.


How to Cite

Nair, N. K., S, N. K., & S, S. C. (1). Enforcing Data Security, Load Balancing And Auditing In Cloud Computing. Asian Journal of Engineering and Technology, 3(4). Retrieved from https://ajouronline.com/index.php/AJET/article/view/3145