scispace - formally typeset
Proceedings ArticleDOI

A multilevel encryption technique in cloud security

TLDR
This work has proposed a multilevel security scheme which is more secure than any type of single level encryption and shows that only authorized user can able to access the cloud data.
Abstract
Today ensuring security is one of the major concern in cloud environment. Cloud privacy is a one of the tentative issue in cloud computing. As the entire cloud user do not have same demands regarding cloud privacy. Some of the clients are satisfied with current policy where as others are quite concerned about the corresponding privacy. As per the fundamental cloud architecture it is generally deployed via three core service models, namely software as a service, platform as service and infrastructure as a service. But unfortunately these entire delivery services model are vulnerable to a range of security attacks by intelligent intruder. Although government as well as major of the organizations are moving fast towards a secure cloud cryptography offers a wide range of algorithms for cloud security but all these algorithms provide single level encryption. To enhance the security level we have proposed a multilevel security scheme which is more secure than any type of single level encryption. Particularly our technique shows that only authorized user can able to access the cloud data. Our algorithm is fast and safe in both direction such as upload and download of a file. As decryption technique is multilevel so if some data is lost then it is very difficult to decrypt the data.

read more

Citations
More filters
Journal ArticleDOI

Software-as-a-Service Security Challenges and Best Practices: A Multivocal Literature Review

TL;DR: According to the study findings, data breaches/leakage, identity and access management, governance and regulatory compliance/SLA compliance, and malicious insiders are the key security challenges with the maximum frequency of occurrence in both FL and GL.
Journal ArticleDOI

Data Integration Challenges for Machine Learning in Precision Medicine

TL;DR: A number of challenges arise in the design of successful designs to medical data analytics under currently demanding conditions of performance in personalized medicine, while also subject to time, computational power, and bioethical constraints as discussed by the authors .
Proceedings ArticleDOI

An Performance Analysis of RSA Scheme Using Artificial Neural Network

TL;DR: From simulation results it is shown that neural network based RSA provides better results than Standard RSA scheme, which is a major disadvantage of RSA scheme.
Proceedings ArticleDOI

Implementation Of An Efficient Security Scheme Through Elliptic Curve Cryptography Based Radio-Frequency Identification(RFID) In Context Of Internet Of Things

TL;DR: This paper has proposed a Elliptic curve Cryptography based RFID scheme for IOT platform which finds an efficient authentication scheme with minimum computational complexity.
Journal ArticleDOI

Improving Privacy-preserving Healthcare Data Sharing in a Cloud Environment Using Hybrid Encryption

TL;DR: The findings show that the proposal performs better than other state-of-the-art systems and can practically share secure health data in cloud environments.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal Article

Above the Clouds: A Berkeley View of Cloud Computing

TL;DR: This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.
Proceedings ArticleDOI

Cloud Computing: Issues and Challenges

TL;DR: This paper first discusses two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing, then identifies several challenges from the Cloud computing adoption perspective.
Journal ArticleDOI

DepSky: Dependable and Secure Storage in a Cloud-of-Clouds

TL;DR: DepSky is presented, a system that improves the availability, integrity, and confidentiality of information stored in the cloud through the encryption, encoding, and replication of the data on diverse clouds that form a cloud-of-clouds.
Proceedings ArticleDOI

Cloud Hooks: Security and Privacy Issues in Cloud Computing

TL;DR: This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses.
Related Papers (5)