Proceedings ArticleDOI
An approach for securing data on Cloud using data slicing and cryptography
Rupesh R Bobde,A. R. Khaparde,M. M. Raghuwanshi +2 more
- pp 1-5
Reads0
Chats0
TLDR
The objective of this technique is to store data in a proper secure and safe manner in order to avoid intrusions and data attacks meanwhile it will reduce the cost and time to store the encrypted data in the Cloud Storage.Abstract:
Cloud computing is one of the major point of discussion in IT industries. The Cloud provides service to the user on demand basis. The trend of using cloud environments is growing for storage and data processing needs. Data security is one of the major issues in cloud environment. The data owner has not control over the data after it is uploaded on cloud. For data security we have to trust on security mechanism provided by third party. We proposed a scheme in this the original data get sliced into different slices. The data in each slice can be encrypted by using different cryptographic algorithms and encryption key before storing them in the Cloud. The objective of this technique is to store data in a proper secure and safe manner in order to avoid intrusions and data attacks meanwhile it will reduce the cost and time to store the encrypted data in the Cloud Storage.read more
Citations
More filters
Journal Article
Security Risks Associated with the Cloud Computing
TL;DR: This paper examines security dangers connected with distributed computing, which include dangers identified with protection, agreeability regulations, personality, utilization of virtual machines, security of information and the security of the system through which the information ventures.
Journal ArticleDOI
Security Algorithms in Cloud Computing
Rohini Bhardwaj,Tejinder Sharma +1 more
TL;DR: Diverse calculations will be examined for security of information in distributed computing for cloud computing services.
Proceedings ArticleDOI
Proposed hybrid RSA algorithm for cloud computing
Rohini,Tejinder Sharma +1 more
TL;DR: Encryption algorithm is used for securing encryption of data over the cloud and the integrity of the data is maintained using hash codes to maintain the integrity in the cloud.
Proceedings ArticleDOI
Minimizing Delay Recovery in Migrating Data between Physical Server and Cloud Computing Using Reed-Solomon Code
Mimouna Alkhonaini,Hoda El-Sayed +1 more
TL;DR: This research proposed a model that detects and eliminates data corruption/failure, leak or modification during the migration process from the physical computing to cloud computing, and achieves provable security assessments and reasonable execution times on poor network connection.
Journal ArticleDOI
Promoting the security of cloud computing using hybrid frameworks layer intrusion detection and neural network
TL;DR: In this research, real-time network traffic monitoring is used to use the network monitoring module to monitor traffic and then use the seventy extraction features of various traffic and neural networks to solve the problem and the classification was made, which increase the security of cloud computing and prevent the intrusion of distractors.
References
More filters
Book ChapterDOI
Cryptographic cloud storage
Seny Kamara,Kristin E. Lauter +1 more
TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Journal ArticleDOI
Security and Privacy Challenges in Cloud Computing Environments
TL;DR: This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.
Proceedings ArticleDOI
Cloud computing security threats and responses
TL;DR: In this article, the authors summarize reliability, availability, and security issues for cloud computing (RAS issues), and propose feasible and available solutions for some of them, and compare the benefits and risks of cloud computing with those of the status quo.
Proceedings ArticleDOI
Privacy Preserving Access Control with Authentication for Securing Data in Clouds
TL;DR: In the proposed scheme, the cloud verifies the authenticity of the user without knowing the user's identity before storing information, and the added feature of access control in which only valid users are able to decrypt the stored information.
Proceedings ArticleDOI
Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing
P. Rewagad,Y. Pawar +1 more
TL;DR: This paper has proposed to make use of digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption Standard encryption algorithm to protect confidentiality of data stored in cloud.
Related Papers (5)
A cloud computing security solution based on fully homomorphic encryption
Zhao Feng,Chao Li,Liu Chunfeng +2 more