scispace - formally typeset
Proceedings ArticleDOI

An approach for securing data on Cloud using data slicing and cryptography

Reads0
Chats0
TLDR
The objective of this technique is to store data in a proper secure and safe manner in order to avoid intrusions and data attacks meanwhile it will reduce the cost and time to store the encrypted data in the Cloud Storage.
Abstract
Cloud computing is one of the major point of discussion in IT industries. The Cloud provides service to the user on demand basis. The trend of using cloud environments is growing for storage and data processing needs. Data security is one of the major issues in cloud environment. The data owner has not control over the data after it is uploaded on cloud. For data security we have to trust on security mechanism provided by third party. We proposed a scheme in this the original data get sliced into different slices. The data in each slice can be encrypted by using different cryptographic algorithms and encryption key before storing them in the Cloud. The objective of this technique is to store data in a proper secure and safe manner in order to avoid intrusions and data attacks meanwhile it will reduce the cost and time to store the encrypted data in the Cloud Storage.

read more

Citations
More filters
Journal Article

Security Risks Associated with the Cloud Computing

TL;DR: This paper examines security dangers connected with distributed computing, which include dangers identified with protection, agreeability regulations, personality, utilization of virtual machines, security of information and the security of the system through which the information ventures.
Journal ArticleDOI

Security Algorithms in Cloud Computing

TL;DR: Diverse calculations will be examined for security of information in distributed computing for cloud computing services.
Proceedings ArticleDOI

Proposed hybrid RSA algorithm for cloud computing

Rohini, +1 more
TL;DR: Encryption algorithm is used for securing encryption of data over the cloud and the integrity of the data is maintained using hash codes to maintain the integrity in the cloud.
Proceedings ArticleDOI

Minimizing Delay Recovery in Migrating Data between Physical Server and Cloud Computing Using Reed-Solomon Code

TL;DR: This research proposed a model that detects and eliminates data corruption/failure, leak or modification during the migration process from the physical computing to cloud computing, and achieves provable security assessments and reasonable execution times on poor network connection.
Journal ArticleDOI

Promoting the security of cloud computing using hybrid frameworks layer intrusion detection and neural network

TL;DR: In this research, real-time network traffic monitoring is used to use the network monitoring module to monitor traffic and then use the seventy extraction features of various traffic and neural networks to solve the problem and the classification was made, which increase the security of cloud computing and prevent the intrusion of distractors.
References
More filters
Book ChapterDOI

Cryptographic cloud storage

TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Journal ArticleDOI

Security and Privacy Challenges in Cloud Computing Environments

TL;DR: This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.
Proceedings ArticleDOI

Cloud computing security threats and responses

TL;DR: In this article, the authors summarize reliability, availability, and security issues for cloud computing (RAS issues), and propose feasible and available solutions for some of them, and compare the benefits and risks of cloud computing with those of the status quo.
Proceedings ArticleDOI

Privacy Preserving Access Control with Authentication for Securing Data in Clouds

TL;DR: In the proposed scheme, the cloud verifies the authenticity of the user without knowing the user's identity before storing information, and the added feature of access control in which only valid users are able to decrypt the stored information.
Proceedings ArticleDOI

Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing

TL;DR: This paper has proposed to make use of digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption Standard encryption algorithm to protect confidentiality of data stored in cloud.
Related Papers (5)