Advancements in Encryption Techniques for Enhanced Data Security Over Cloud

Author(s):  
Rishu . ◽  
◽  
Vijay Kumar Sinha ◽  
Shruti Aggarwal ◽  
◽  
...  

With the advancements in internet technologies and increased transactions over the internet, the threats for data security increased many folds than ever. Nowadays message application services are in great demand, as they offered end-to-end encryption (E2EE) that is essential to provide security to the users while communication takes place between parties. Today messaging application service is in great use for communication. For making communication over the network. This paper presents that security is essential while communication takes place between users and how E2EE offers security to the users. Consumers' concerns related to the security and privacy of their data are growing day by day with increased inter-connectivity. We examine the existing mobile message service encryption protocols that provide security and the features which preserve privacy for messenger applications and also evaluate the technical challenges involved in its implementations.

Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


Author(s):  
Pradeep Kumar Tiwari ◽  
Sandeep Joshi

Researchers have done tremendous works for data security, but a robust security mechanism is not available yet. Researchers are doing continuous work to build robust SaaS mechanism. SaaS has several security vulnerabilities. Data security is still the most important challenge to researcher and they can constantly do research to protect the data over the network but they are facing numerous technical challenges to completely secure the cloud network and cloud storage. This work would be helpful to understand data security and privacy problems. Researchers can find the new way to understand SaaS security vulnerabilities and currently available solutions.


2021 ◽  
Vol 2021 ◽  
pp. 1-1
Author(s):  
Umair Khadam ◽  
Muhammad Munwar Iqbal ◽  
Meshrif Alruily ◽  
Mohammed A. Al Ghamdi ◽  
Muhammad Ramzan ◽  
...  


2019 ◽  
Vol 16 (9) ◽  
pp. 3643-3655
Author(s):  
Abdullah Saad Alqahtani

The Internet of things market grew rapidly in recent years. The increased number of connected objects and the diversity of IoT services caused many challenges. The IoT links heterogeneity sensors from different networks in order to address users’ needs. A systematic review study was accomplished to identify and clarify the challenges of the IoT with an initial result set of 811 articles, covering studies published from 2013 to 2019. 50 studies were selected and classified according to the study criteria. The results include highlighting the 10 main challenges with the IoT and introducing data security and privacy as major concerns. The lack of standardization and interoperability is also considered a critical challenge with the IoT. In addition, the descriptive results reported that most of the investigated papers are related either to industrial or technical aspect. A lack of other areas with the IoT, such as educational, social, and cloud, were reported as well.


2020 ◽  
Vol 2020 ◽  
pp. 1-15 ◽  
Author(s):  
Umair Khadam ◽  
Muhammad Munwar Iqbal ◽  
Meshrif Alruily ◽  
Mohammed A. Al Ghamdi ◽  
Muhammad Ramzan ◽  
...  

In our daily life, Internet-of-Things (IoT) is everywhere and used in many more beneficial functionalities. It is used in our homes, hospitals, fire prevention, and reporting and controlling the environmental changes. Data security is the crucial requirement for IoT since the number of recent technologies in different domains is increasing day by day. Various attempts have been made to cater the user’s demands for more security and privacy. However, a huge risk of security and privacy issues can arise among all those benefits. Digital document security and copyright protection are also important issues in IoT because they are distributed, reproduced, and disclosed with extensive use of communication technologies. The content of books, research papers, newspapers, legal documents, and web pages are based on plain text, and the ownership verification and authentication of such documents are essential. In the current domain of the Internet of Things, limited techniques are available for ownership verification and copyright protection. In the said perspective, this study includes the discussion about the approaches of text watermarking, IoT security challenges, IoT device limitations, and future research directions in the area of text watermarking.


It is becoming increasingly clear that the education system of our country is undergoing significant changes. It is gratifying that distance learning is widely used, along with other forms of education. It is no secret that many people use the Internet only to read the news, search for information, use e-mail or sell rumors. The possibilities of the Internet are growing day by day. A new phase of Internet use has begun, which means that the Internet has been introduced in various fields. Internet technologies: distance learning, e-libraries, telemedicine, telemetrology, e-business, e-shops, etc. Below are brief but basic descriptions of these technologies.


Author(s):  
K. Praveen Kumar

Abstract: High speed Internet technology development and data technologies create a huge amount of information in day by day. Use of big data and cloud both are managing traditional data processing and storage issues. At the same time users can face many issues like data security and privacy manner. Here we proposed Blockchain based secure algorithm for to achieve Security and Privacy for big data. Keywords: Security, Blockchain, Big data and Cloud environment


Author(s):  
Pradeep Kumar Tiwari ◽  
Sandeep Joshi

Researchers have done tremendous works for data security, but a robust security mechanism is not available yet. Researchers are doing continuous work to build robust SaaS mechanism. SaaS has several security vulnerabilities. Data security is still the most important challenge to researcher and they can constantly do research to protect the data over the network but they are facing numerous technical challenges to completely secure the cloud network and cloud storage. This work would be helpful to understand data security and privacy problems. Researchers can find the new way to understand SaaS security vulnerabilities and currently available solutions.


Sign in / Sign up

Export Citation Format

Share Document