A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique

Author(s):  
AyodhyaRam Mohanthy ◽  
Jagadish Gurrala
2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2012 ◽  
Vol 452-453 ◽  
pp. 791-795 ◽  
Author(s):  
Ya Kun Zhang ◽  
Jia Yin Tian ◽  
Cheng Yang ◽  
Yi Chun Zhang ◽  
Fang Tian Hou

Public Key Infrastructure (PKI) based or Identity-based Encryption (IBE) based authentication schemes are introduced into network storage systems recently. However, the schemes have unavoidable disadvantages:(1)the exchange of digital certificates are complicated.(2)the public key is long.(3)the transmission of private key is vulnerable. In this paper, we design a network storage authentication scheme using Double-PKG. The theoretical and experimental results show that it can ensure the confidentiality, integrity, availability and non-repudiation during data transmission and storage. Our scheme uses the double authentication infrastructure. And it can effectively protect the key transmission. The data encryption and decryption in experiments are relatively stable, so the overall scheme efficiency has been greatly improved.


In this paper, we introduce an encryption and decryption procedure with high security by mathematical model, using Laplace transformation and Inverse Laplace Transformation for the given transforming data from one end to other end. We also give an example. Here we convert plain text to ASCII code. We take two primes as a primary key for encryption and decrypt in of the original data.


Sign in / Sign up

Export Citation Format

Share Document