scholarly journals Hybrid AES-ECC Model for the Security of Data over Cloud Storage

Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2673
Author(s):  
Saba Rehman ◽  
Nida Talat Bajwa ◽  
Munam Ali Shah ◽  
Ahmad O. Aseeri ◽  
Adeel Anjum

A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The user has access to the data anywhere and at any time. However, the data over the cloud do not remain secure all the time. Since the data are accessible to the end user only by using the interference of a third party, it is prone to breach of authentication and integrity of the data. Moreover, cloud computing allows simultaneous users to access and retrieve their data online over different Internet connections, which leads to the exposure, leakage, and loss of a user’s sensitive data in different locations. Many algorithms and protocols have been developed to maintain the security and integrity of the data using cryptographic algorithms such as the Elliptic Curve Cryptography (ECC). This paper proposes a secure and optimized scheme for sharing data while maintaining data security and integrity over the cloud. The proposed system mainly functions by combining the ECC and the Advanced Encryption Standard (AES) method to ensure authentication and data integrity. The experimental results show that the proposed approach is efficient and yields better results when compared with existing approaches.

2021 ◽  
Vol 11 (2) ◽  
pp. 321-328
Author(s):  
Prisca I. Okochi ◽  
Stanley A. Okolie ◽  
Juliet N. Odii

An Improved Data Leakage Detection System is designed to mitigate the leakage of crucial and sensitive data in a cloud computing environment. Generally, leakage of data in computing system has caused a lot of irreparable damage or catastrophe to various institutions or organizations worldwide. Therefore, this research aims at detecting and preventing any intentional or non-intentional data leakages using dynamic password or key for data decryption security mechanisms. To achieve this the OOADM methodology was adopted. The new system was implemented using ASP.net MVC and Microsoft SQL Server Management Studio as the backend. And by incorporating an Audit trail/Transaction log mechanism, the new system monitors the activities within and outside the computing environment with date and time stamp. Hence, the system can be applied in any environment for the prevention and detection of any data leakage.


2013 ◽  
Vol 756-759 ◽  
pp. 837-840 ◽  
Author(s):  
Sheng Chang Guo ◽  
Yi Liu ◽  
Jie Ling

This paper draws on the principle of identity-based public key encryption (IBE) system algorithm. A suitable Identity authentication scheme for cloud computing environment is proposed. Security analysis of the scheme is given. The proposed scheme using the bidirectional signature between Client and cloud server has solved the safety verification audit, and realized identity authentication in cloud computing. We provide end-to-end authentication instead of trusted third party, which solve the problem of Key Escrow and improve the efficiency of the management of the identity authentication.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 131
Author(s):  
Dr Gudapati Syam Prasad ◽  
Vidya S. Gaikwad

The cloud computing technology provides cost effective, powerful computation resources on the fly. It minimizes the need to procure and maintain expensive hardware, software and reserve space for IT infrastructure. These features for cloud computing encourages organizations and individuals to migrate their resources needs and services to the cloud. However, cloud computing services provided by third-party vendors possesses various security threats. The cloud services store sensitive data (such as credentials, personal information, etc.) of various users on the shared environment that escalates security concerns. The  aim of this research survey paper are three-fold: i) provides guideline for researchers who are new to the cloud computing security area, ii) provides the state-of-the-art survey of cloud computing security issues and challenges, and iii) provides the further research directions required into security assurance of the cloud computing.  


2013 ◽  
Vol 300-301 ◽  
pp. 664-667
Author(s):  
Hwa Young Jeong ◽  
Hae Gill Choi

Software is also an integral part of other major ICT (information communication technology) equipment and devices, such as hardware, network, end-user communications equipment and carrier services. Recently software area has changing their using method from traditional ways to providing their process as a service. That is web service based SaaS in cloud computing. In this research, we consider the framework to process web service on SaaS, cloud computing environment. For this process, the framework has service search agent, service management mediator, UDDI server and web service inform.


Author(s):  
. Monika ◽  
Pardeep Kumar ◽  
Sanjay Tyagi

In Cloud computing environment QoS i.e. Quality-of-Service and cost is the key element that to be take care of. As, today in the era of big data, the data must be handled properly while satisfying the request. In such case, while handling request of large data or for scientific applications request, flow of information must be sustained. In this paper, a brief introduction of workflow scheduling is given and also a detailed survey of various scheduling algorithms is performed using various parameter.


Sign in / Sign up

Export Citation Format

Share Document