scholarly journals Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment

Author(s):  
Quazi Warisha Ahmed Et.al

Now-a-days all documents are in a digital format as well as everyone need to maintain their data in electronic mode with the help of cloud servers. A cloud server provides lots of facilities to users such as remote data maintenance, huge data handling and so on. But in the case of security many cloud servers are providing probabilistic results alone. So, that a new cloud server data maintenance scheme is required to provide a high-level data security to the cloud system in an efficient manner. This paper introduces a new crypto-approach called Novel Hybrid Encryption Mode (NHEM), in which this algorithm integrates several latest approaches of crypto logics into it and provides a top-end security level to the cloud data. This NHEM is derived from the base factors of two cryptographic algorithms called Advanced Encryption Standard with 512-bit size of key frequency with Message Digest (MD5) algorithm. By using the integration of these two powerful approaches, a novel approach called NHEM is designed and it provides a huge support to preserve security on cloud medium. The cloud data needs to be protected from unwanted threats and intruders by means of raising an interruption attacks on server. The proposed approach of Novel Hybrid Encryption Mode concentrates more on access control logics and the crypto norms with respect to privacy measures. In this paper, the proposed scheme assures the data is too robust and no one can attack the data without proper credentials as well as the outcome proofs are clearly given on the resulting unit of this paper. The Advanced Encryption Standard algorithm is a well-known and powerful crypto scheme and the MD5 algorithm is also considered to be the unique unidirectional algorithm to provide security level in energetic manner. These two algorithms are combined together with the bit frequency of 512 to achieve the highest accuracy levels in data security over cloud environment as well as the resulting portion clearly illustrates that with proper graphical outcome.

Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


Author(s):  
Dadi Madhu SivaRama Krishna, S.Suryanarayana Raju and Ajay Dilip Kumar Marapatla

Data mining is a critical stage in the Knowledge Discovery process acquire from databases (KDD), thus a new approach that’s can joint with online data process of extraction, which serves as data gathering from the global network ( web), and data mining techniques is required.The primary contribution of this study is the proposal of a system for collecting categorical online data on several cloud servers while ensuring data security and integrity for consumers. The algorithms' effectiveness employed inside our technique is illustrated using clustered sections of the data that should be encrypted inside the cloud server combining the three clustering measurements precision, recall, and accuracy. We proposed KeyGen algorithm to maintain data security by using cryptographic concepts with respective ABE (attribute-based encryption) and cypher text policy (cypher text policy) are two types of attribute-based encryption (CP-ABE).


2021 ◽  
Author(s):  
Amrutha S ◽  
MAHESH A S

Abstract An outbreak of corona virus caused by a novel virus called SARS-CoV-2 occurred at the end of 2019. The unexpected outbreak and unchecked global spread of COVID19 indicate that the current global healthcare networks have limitations in addressing the crises for public safety. In this paper, we have studied to secure the COVID-19 patients ’ data. Data security and Storage Management becomes the most promising task in it, to manage it we use cloud computing. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. a novel secure Online/offline Decentralized Attribute Based Encryption for cloud. The proposed scheme reduces the online computation burden for data owners by completing the preprocessing computation as much as during the offline phase. The proposed scheme eliminates a major of computation overhead on user side by migrating the partial decryption computation to the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.


The data security in cloud has been well studied towards the data present in the cloud environment. Number of techniques has been discussed earlier and each produces different performance results in data security. But still there are gaps in performance in security which should be optimized. To improve the security performance, an efficient class based encryption (CBE) with User profile (UP) is presented. The proposed CBE-UP method groups the cloud data at attribute level based on the importance mentioned in the taxonomy. The data taxonomy covers various information related to the attribute of any data point like their sensitivity, importance in different class and so on. According to the taxonomy, the method estimates the Class Sensitivity Measure (CSM) for each attribute, which has been used to classify the data attribute. Further, for each Attribute class, the method generates different key from the key set and assigns various scheme to perform encryption and decryption. The selection of key and method has been iterated at each time window. The performance of data security has been improved and reduces the network overhead in distribution of keys to the registered users.


It provides efficient processing power, an unbelievable computation speed and a wide array of stage space.Basically, the cloud computing transfer the huge volume of data on the different cloud servers which is maintained by the different kinds of cloud providers and this process help to remove the physical data’s possession even though user are the data owners. This extraordinary element coordinates to raise the innumerable new security disadvantages which have not been surely known obviously. Consequently, in this paper present a novel methodology for secure cloud information stockpiling with the assistance of Merkle Hash Tree (MHT) with hash based advanced mark to give trustworthiness and protection of redistributed information in cloud using private key security approach. Additionally, in this work use theAdvanced Encryption Standard (AES) for conforming the data confidentiality and data security before the data is stored into the cloud. The simulation results show the better results in term of Data Recovery Time, Processing time, and efficiency respectively


2019 ◽  
Vol 8 (2) ◽  
pp. 2271-2273

Cloud computing is come out as computing network throughout web. Cloud information pamper accumulating of the data within the cloud additionally has sharing qualifications amid manifold clients. Since malfunction of human being or hardware and constant software package blunder, cloud information is interrelated to information veracity. Numerous systems have been anticipated in order to tolerate equally the data proprietors as well as the community auditors to review cloud data truthfulness unmistakably devoid of salvage the intact data commencing the cloud servers. A third party inspector can carry out reliability inspection and also the distinctiveness of the signer on collective information which is held in reserve private from them. Throughout this work, exploration for auditing the truthfulness of public information surrounded by the cloud with imaginative client deletion whereas immobile protecting distinctiveness seclusion. This work have predisposition to additionally improve presented method; formerly any patron revolutionize the consequence from table then it have a predisposition to scrutiny that is import and repeatedly refurbish inventive value.


Cloud computing was one of the most significant computational models that help to handle the vast amount of data in a flexible and secure environment. In the current scenario, the amount of data being shared and the number of users or group in the cloud has been continuously increasing. The rise in the usage of the clouds had instigated the need to provide the security to the data that were transmitted among the user and owner through a cloud server. The data in the cloud most commonly endure in issues related to the integrity, privacy, and confidentiality (IPC). This paper was the accumulation of extensive research works to resist the issues in the clouds. Many researchers had indulged in the process of enhancing the security of the cloud data by generating the keys, performing the cryptic mechanisms, auditing, de-duplication techniques, enhancement in handling the queries and many more approaches. The outcomes from the some works are discussed with other approaches to understand the objective accomplished by each work over the other. The general IPC issue and challenges exist in the cloud environment were listed and it was identified that there is a necessity for the better methodology to accomplish the robust cloud environment


Abuse of cloud services consequently unauthorized access to cloud data by malicious software automation is prevented by CAPTCHA. The secure usable mechanism is mandatory for resilience to automate attacks accordingly to create pleasant challenges. In this paper, we propose a novel image-based graphical Color Channel CAPTCHA scheme to distinguish between malware and humans for data security in the cloud environment. This color channel CAPTCHA is designed with 2 X 2 grids of different color channels with micro invisible circles or less visible moving circles. This simple challenge is completed by click on the specified circles in the given order with very less solving time, while compared to the state of the art. The experimental study has been conducted among 41 participants on both usability and performance of color channel CAPTCHA.


Sign in / Sign up

Export Citation Format

Share Document