Secure Storage and Replication using Hybrid Cryptographic Algorithm for Cloud Environment

2018 ◽  
Vol 6 (7) ◽  
pp. 199-203
Author(s):  
Arpit Agrawal ◽  
Sakshi Joshi
Author(s):  
Riccardo Di Pietro ◽  
Marco Scarpa ◽  
Maurizio Giacobbe ◽  
Antonio Puliafito

2013 ◽  
Vol 646 ◽  
pp. 235-239
Author(s):  
Hana Do ◽  
Hoon Jeong ◽  
Eui In Choi

The cloud environment is recently emphasized when we save a large amount of data with a minimum of maintenance. But the cloud is a variable environment that data is likely to be changed when which is transferred, and even doesn't permanently store. Besides it has the risk of phishing from a third party. A scalable storage space as one of the features of the cloud has to consist as more proactive access control, secure encryption, and key management in the aspect of the size of the database and the number of users. In this paper, we analyze about database security requirements of these environment and the provided encryption technologies of until now. And, even anyone who don't have the expertise for security assessment and management or CC could be easily accessible it.


2020 ◽  
Vol 8 (5) ◽  
pp. 1236-1242

In advent of cloud environment, cloud operator is not a completely trusted to put on private information, because of lack of consumer to cloud control. To assurance privacy, documents sharer deploy their encipher documents. Encipher documents dispense to among consumers using CP-ABE scheme. But it is not completely safe in opposition to different assaults. The prior knowledge cannot offer any verification ability to cloud operator whether the user can decipher or not. Various invaders may obtain lot of document by initiate EDoS assaults. The consumer of cloud abides cost. To handle above issues, this article suggests a problem solving plan to safe encipher cloud repository from EDoS assaults and maintain supply utilization. It utilizes CP-ABE tactics in a black-box method furthermore accomplish impulsive entryway contract epithetical CP-ABE. We tend to present 2 mechanisms for various styles, observed via achievement and shield research.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 511
Author(s):  
Mr. Girish kumar d ◽  
Dr. Rajashree v biradar ◽  
Dr. V c patil

Cloud computing increases the capacity or capabilities vigorously without devoting new infrastructure, training new personnel, or licensing the new software . In the past few years, cloud computing has grown from being a promising business concept to one of the fast-growing sectors of IT industry. As the more sensitive information and data are moved into the cloud data centers, they run on virtual computing resources in the form of virtual machines. Security has become one of the major issue in cloud computing which reduces the growth of cloud environment with complications in data privacy and data protection continue to outbreak the market. A new model created for the advancement should not result as a threat to the existing model. The architecture of cloud poses such a threat to the security of existing models when deployed in a cloud environment. The different cloud service users need to be attentive in considerate,about the risk of data breaks in the new environment. In this paper, advanced survey of the various secured storage in cloud computing using bidirectional protocols is presented.  


2018 ◽  
Vol 56 (1) ◽  
pp. 78-85 ◽  
Author(s):  
Gagangeet Singh Aujla ◽  
Rajat Chaudhary ◽  
Neeraj Kumar ◽  
Ashok Kumar Das ◽  
Joel J. P. C. Rodrigues

Secure storage and easy retrieval of data is major concern for patients when medical data is stored over cloud platform. The unique features of cloud environment are high performance, data availability and security among which security of data stored in cloud environment is sensitive it can be easily attacked by intruders. Concerning medical images, while storing data, proper secure authentication method should be applied in order to avoid misuse of medical data. When this medical image is retrieved, the clarity of retrieved image should be high in order to determine the exact cause of sickness. This paper focuses on proposing a secure storage and retrieval of medical images stored in cloud with visual cryptographic technique using AES algorithm. The experimental results show that the proposed system is able to store images securely and retrieve medical images with high clarity.


Database as a Service provides high availability and scalability in cloud but users do not physically control over their data, therefore, data integrity is serious concerned. Authenticity of data and its verification is one of major risk in next generation document-oriented databases. It is possible that malicious insider and outsider can change and compromise the data. A system is proposed in which cloud environment secure storage and access semi-structured data for non-relational document-oriented database. The proposed system effectively provides data integrity for sensitive and confidential fields and verification of data whether it has been altered or not in outsource database in the public domain.


2021 ◽  
Vol 11 (4) ◽  
pp. 7321-7325
Author(s):  
M. F. Hyder ◽  
S. Tooba ◽  
. Waseemullah

In this paper, the implementation of the General Secure Cloud Storage Protocol is carried out and instantiated by a multiplicatively Homomorphic Encryption Scheme (HES). The protocol provides a system for secure storage of data over the cloud, thereby allowing the client to carry out the operational tasks on it efficiently. The work focuses on the execution of five major modules of the protocol. We also evaluate the performance of the protocol with respect to the computation cost of these modules on the basis of different security parameters and datasets by conducting a series of experiments. The cloud was built using OpenStack and the data were outsourced from the client’s system to the cloud to study the security features and performance metrics when adopting the cloud environment.


Sign in / Sign up

Export Citation Format

Share Document