Enhanced Security Architecture for Cloud Data Security
@inproceedings{Kant2013EnhancedSA, title={Enhanced Security Architecture for Cloud Data Security}, author={Chander Kant and Yogesh Sharma}, year={2013} }
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability decide whether security and privacy of data stored on cloud environment is maintained or not. The…
No Paper Link Available
41 Citations
Multilevel Security Approach for Cloud Data Storage
- Computer Science
- 2015
A novel approach to cloud security is to implement by using multilevel security system that combines cryptography, session management, log management system, and multi level security system to reduce the malicious activity and increase the security level in the cloud storage.
Multilevel Security for Cloud Storage using Encryption Algorithms
- Computer Science
- 2016
This research paper proposes an algorithm called Multilevel algorithm by using which an unauthorized user cannot access or modify the data or calculations of cloud, to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.
Analysis of Encryption Algorithms in Cloud Computing
- Computer Science
- 2015
As the most promising cloud computing approach, this paper suggests selective encryption techniques, which almost gives the data confidentiality just like private cloud models.
Security in Cloud Computing usingCryptographic Algorithms
- Computer Science
- 2015
The proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.
Enhanced data security model for cloud using ECC algorithm and third party auditor
- Computer Science
- 2016
Elliptic Curve Cryptography is proposed that owes a strong mathematical structure that raises the confidentiality level to an exceptionally high standard using minimum resources as compared to other existing algorithms like RSA, DES, AES etc., making it a first choice for devices with limited computing ability.
A SURVEY ON ENHANCING DATA SECURITY ON CLOUD STORAGE USING SPLIT TECHNIQUE
- Computer Science
- 2018
This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment.
THREE LEVEL AUTHENTICATION SYSTEM TO ENHANCE SECURITY ON CLOUD USING K-MEAN CLUSTERING TECHNIQUE
- Computer Science
- 2017
The authors preserved privacy in data storage by validating through IP based detection, Geographical location based security technique, and constant key length encryption technique irrespective of users is used to secure data on cloud storage.
Enhancement of Security in Cloud using Hybrid Encryption Technique
- Computer Science
- 2016
This hybrid technique is a two way secured data encryption system, which focusses on the matters related to user’s privacy, authentication and accuracy, and offers more security along with authentication in comparison to other hybrid algorithm given in literature.
The data intactness of efficient audit service outsourcing for data integrity in clouds
- Computer ScienceSEVENTH INTERNATIONAL SYMPOSIUM ON NEGATIVE IONS, BEAMS AND SOURCES (NIBS 2020)
- 2021
This article focuses on cloud server information security and integrity, the protection of cloud-specified information in relation to running computing servers stored in cloud computing.
Novel cryptographic approach to enhance cloud data security
- Computer Science
- 2021
A method to generate the most secured cryptographic keys using the blend of two key derivation functions PBKDF2 and Argon 2 is proposed, where there would be no need to store and send key for encryption and decryption.
References
SHOWING 1-10 OF 21 REFERENCES
Secure storage and access of data in cloud computing
- Computer Science2012 International Conference on ICT Convergence (ICTC)
- 2012
This paper proposes a method that allows user to store and access the data securely from the cloud storage and ensures the security and privacy of data stored on cloud.
Identity-based distributed cloud storage encryption scheme
- Computer ScienceThe Proceedings of 2011 9th International Conference on Reliability, Maintainability and Safety
- 2011
An identity-based distributed encryption scheme is proposed in this paper to ensure the privacy safety of the cloud storage and is more suitable for the privacy-preserving of mass users.
Evaluation and Comparison of Security Issues on Cloud Computing Environment
- Computer Science
- 2012
The performance of different security algorithm on a cloud network and also on a single processor for different input sizes and advanced Encryption Standard security algorithm implemented for ensuring security framework are described.
A Performance Comparison of Data Encryption Algorithms
- Computer Science2005 International Conference on Information and Communication Technologies
- 2005
It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms.
Performance Evaluation of Symmetric Encryption Algorithms
- Computer Science
- 2008
Evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, DES, 3DES, RC2, Blowfish, and RC6 to demonstrate the effectiveness of each algorithm.
General survey on massive data encryption
- Computer Science2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT)
- 2012
This paper discusses the encryption principles, advantages and disadvantages of some mainstream massive data encryption technologies, i.e., the encryption technology based on modern cryptosystem, the encryptiontechnology based on parallel and distributed computing, theryption technologybased on biological engineering, and Attribute-basedmassive data encryption technology.
Arrendond, “Performance Comparison of Elliptic Curve and RSA Digital Signatures
- 2004
Data Security in Cloud Computing with Elliptic Curve Cryptography
- Computer Science
- 2012
Data security of cloud in cloud computing is explored by implementing digital signature and encryption with elliptic curve cryptography to reduce costs associated with computing while increasing scalability and flexibility for computing services.
Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography
- Computer ScienceCSA 2012
- 2012
S symmetric and asymmetric cryptographic algorithms are adopted for the optimization of data security in cloud computing and to ensure data confidentiality, integrity and authentication.
Energy Consumption of Encryption Schemes in Wireless Devices
- Computer Science
- 2003
The research work carried out in this thesis, provides results that encourage having encryption schemes as software implementation in Wireless LANs and provides results reflecting the advantages of doing so.