scholarly journals SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY

Author(s):  
Khumani ◽  
Priya Roy ◽  
Swapnil ◽  
Suman Madan

In this paper our intention is to soundly preserve records into the cloud, with the aid of the usage of splitting statistics into numerous chunks and storing components of it on cloud with inside the route of a way that preserves statistics confidentiality, guarantees availability and integrity. The all at once superior use of cloud computing with inside the various corporation and IT industries offers new software program with low fee. Cloud computing is beneficial in phrases of low fee and accessibility of records. Cloud computing offers lot of blessings with low fee and of records accessibility via Internet. Ensuring the protection of cloud computing can be a outstanding take into account the cloud computing environment, as customers regularly preserve touchy records with cloud garage corporations, however the ones corporations additionally may be untrusted. So, sharing statistics in normal way at the same time as keeping statistics from an untrusted cloud stays a tough issue. Our method guarantees the protection and privateness of consumer touchy records with the aid of the usage of storing statistics at some point of unmarried cloud, with the use of AES, DES and RC2 sets. KEYWORDS— Cloud computing, Data Security, Cryptography, Storage.

2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


Author(s):  
Abdullahi Abubakar ◽  
Alhaji Idi Babate ◽  
Abdulhakeem Ishola ◽  
Asma’u Muhammad Sani

Cloud computing holds the possibility to annihilate the needs for setting up of costly computing infrastructure for IT-based services and proffering IT Solutions.  It offers an adaptable IT architecture which is accessible via the internet for lightweight and hand-held compact gadgets. The concept has encouraged numerous folds to improve in the capacity or capabilities of the existing and new software. In the cloud computing environment, the whole data/information is available over a set of networked resources, empowering the information to be accessible via virtual machines. Considering the fact that the cloud computing server may be located in any part of the world beyond the reach and control of users, there are various security issues and privacy challenges that need to be clearly understood with a view to identifying how to mitigate them.  Likewise, there are possibilities of the imminent breakdown of servers which have been witnessed in recent times. This research addresses the security issues connected with cloud computing, provides analysis of the militating factors against the successful implementation of cloud computing and proffers useful recommendations on how to ameliorate identified issues.


2020 ◽  
Vol 151 ◽  
pp. 539-547 ◽  
Author(s):  
Suyel Namasudra ◽  
Debashree Devi ◽  
Seifedine Kadry ◽  
Revathi Sundarasekar ◽  
A. Shanthini

Author(s):  
Howard Hamilton ◽  
Hadi Alasti

Data security in the cloud continues to be a huge concern. The adoption of cloud services continues to increase with more businesses transitioning from on premise technology infrastructures to outsourcing cloud-based infrastructures. As the cloud becomes more popular, users are increasingly demanding control over critical security elements of the data and technology assets that are in the cloud. In addition, there are still cries for greater data and security in the cloud. The goal of this paper is to provide cloud service users with greater control over data security in the cloud while at the same time optimizing overall security in the multi-tenant cloud computing environment. This paper introduces cloud-based intelligent agents that are configurable by the users and are expected to give greater compliance for data security in any of the cloud service models.


Sign in / Sign up

Export Citation Format

Share Document