scispace - formally typeset
Proceedings ArticleDOI

A framework based on RSA and AES encryption algorithms for cloud computing services

TLDR
Current scheme is proposed which is based on combination of RSA and AES encryption methods to share the data among users in a secure cloud system to provide difficulty for attackers as well as reducing the time of information transmission between user and cloud data storage.
Abstract
Cloud computing is an emerging computing model in which resources of the computing communications are provided as services over the Internet Privacy and security of cloud storage services are very important and become a challenge in cloud computing due to loss of control over data and its dependence on the cloud computing provider While there is a huge amount of transferring data in cloud system, the risk of accessing data by attackers raises Considering the problem of building a secure cloud storage service, current scheme is proposed which is based on combination of RSA and AES encryption methods to share the data among users in a secure cloud system The proposed method allows providing difficulty for attackers as well as reducing the time of information transmission between user and cloud data storage

read more

Citations
More filters
Proceedings ArticleDOI

Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices

TL;DR: A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK) generation scheme, which reuses the RSA scheme with a Diophantine form of the nonlinear equation for memory efficiency and performs well.
Proceedings ArticleDOI

Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain

TL;DR: A blockchain enabled scheme is proposed to protect the index data through an encrypted secure channel between the edge and fog nodes, which reduces the chance of attacks on the small edge and Fog devices.
Proceedings ArticleDOI

Multi key distribution scheme by diophantine form for secure IoT communications

TL;DR: This paper aims to propose an encryption algorithm used for secure communication by taking into account the limitations of IoT devices, which have a minimal amount of processing capabilities.
Posted Content

Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain

TL;DR: In this paper, a blockchain enabled scheme is proposed to protect the index data through an encrypted secure channel between the edge and fog nodes, which reduces the chance of attacks on the small edge-and fog devices.
Proceedings ArticleDOI

Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud

TL;DR: The proposed algorithm reduces the time of encryption and decryption processes by dividing the file into blocks and enhances the strength of the algorithm by increasing the key size, which paves the way to store data in cloud by the users without any inconvenience.
References
More filters
Book ChapterDOI

Cryptographic cloud storage

TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Proceedings ArticleDOI

Ensuring data storage security in Cloud Computing

TL;DR: Wang et al. as discussed by the authors proposed an effective and flexible distributed scheme with two salient features, opposing to its predecessors, by utilizing the homomorphic token with distributed verification of erasure-coded data, achieving the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s).
Journal ArticleDOI

Toward Secure and Dependable Storage Services in Cloud Computing

TL;DR: This paper proposes a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data, which is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Journal ArticleDOI

Ensuring Data Storage Security in Cloud Computing

TL;DR: A new data encoding scheme called layered interleaving is proposed, designed for time-sensitive packet recovery in the presence of bursty loss, which is highly efficient in recovering the singleton losses almost immediately and from bursty data losses.
Journal ArticleDOI

A combined approach to ensure data security in cloud computing

TL;DR: A frame work comprising of different techniques and specialized procedures is proposed that can efficiently protect the data from the beginning to the end, i.e., from the owner to the cloud and then to the user.
Related Papers (5)