RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing

@inproceedings{Patial2012RSAAA,
  title={RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing},
  author={Abhishek Patial and Sunny Behal},
  booktitle={BIOINFORMATICS 2012},
  year={2012}
}
Cloud computing presents IT organizations with a funda­mentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a core problem in cloud computing, there are some kind of solution that are provide some security with model, some technology. In this paper is attempt to secure data from unauthorized access, the Method of data security is RSA… 

Tables from this paper

ENHANCING SECURITY IN CLOUD COMPUTING STRUCTURE BY HYBRID ENCRYPTION
Modern communication is containing different types of networks depending on the behavior of users. Cloud network and services are one of the mostly used networks. Security in the cloud service
Data Classification Based on Confidentiality in Virtual Cloud Environment
TLDR
After implementing the proposed model, it is found that the confidentiality level of data is increased and this model is proved to be more cost and memory friendly for the users as well as for the cloud services providers.
A Review on Hybrid Encryption in Cloud Computing
  • Lalit Kumar, N. Badal
  • Computer Science
    2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU)
  • 2019
TLDR
In this paper user provides some previous information about that types of works and the major focus of user is on the hybrid approach of AES and FHE, which helps the user to keep data into more redundant and secure in comparisons of some other.
Transmission of Encrypted Messages in Cloud Security using Hybrid Approach
Modern communication is containing different types of networks depending on the behavior of users. Cloud network and services are one of the mostly used networks. Security in the cloud service
Encrypted Message Transmission in Cloud Security for Overlay network
TLDR
Distributed cloud service architecture is considered which is used as network detection system for outer attacks to the cloud architecture, which will challenge the odds and can be suitable for cloud computing structures.
REVIEW PAPER ON ANALYSING THE INFORMATION SECURITY IN INTERNET BANKING
TLDR
A systematic review of more than 60 research papers which will start from the basic benefits for adopting internet banking, to the issues involved in the same specifically related to the security, and analyzes the customer’s viewpoint towards security are presented.

References

SHOWING 1-10 OF 32 REFERENCES
Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing
TLDR
This Research Paper has tried to assess Cloud Storage Methodology and Data Security in cloud by the Implementation of digital signature with RSA algorithm.
Data Security Mechanism for Cloud
TLDR
This paper emphasizes on improving existing authentication mechanism & implementing data security schemes to secure data from the Data Flow.
Enhancing Security in Cloud Computing
TLDR
This paper proposes an effective and flexible scheme with two salient features, opposing to its predecessors to ensure the security of users' data in the cloud, and displays fake information in case of unsuccessful login for avoiding further login trials by intrusion.
Enhanced Secure Algorithm for Message Communion
TLDR
A safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet and a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication is put forward.
Ensuring Data Storage Security in Cloud Computing
TLDR
A new data encoding scheme called layered interleaving is proposed, designed for time-sensitive packet recovery in the presence of bursty loss, which is highly efficient in recovering the singleton losses almost immediately and from bursty data losses.
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
TLDR
This paper uniquely defines the fundamental properties of threshold-multisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject.
Design and auditing of Cloud computing security
TLDR
A data protection scheme with public auditing scheme is outlined that will address a number of the unique factors to be considered when data enters the Cloud, by providing a mechanism to allow for data to be encrypted in the Cloud without loss of accessibility or functionality for authorized parties.
An effective privacy protection scheme for cloud computing
TLDR
The Effective Privacy Protection Scheme (EPPS) is proposed to provide the appropriate privacy protection which is satisfying the user-demand privacy requirement and maintaining system performance simultaneously.
Cloud Security Issues
TLDR
Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services.
Cloud Computing Research and Security Issues
  • Jianfeng Yang, Zhibin Chen
  • Computer Science
    2010 International Conference on Computational Intelligence and Software Engineering
  • 2010
TLDR
The background and service model of cloud computing, the product of the fusion of traditional computing technology and network technology, is introduced and the existing issues in cloud computing such as security, privacy, reliability and so on are introduced.
...
...