A NOVEL APPROACH OF HYBRID MODEL OF ENCRYPTION ALGORITHMS AND FRAGMENTATION TO ENSURE CLOUD SECURITY
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 12
Abstract
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. In the proposed work, we have tried to increase the cloud security by using encryption algorithms like AES and RSA along with OTP authentication. We have also fragmented the data by using data distribution at the server end.
Authors and Affiliations
Amandeep Kaur, Mr. Pawan Luthra
Information Security Awareness Behavior : A Conceptual Model for Cloud
Cloud computing has changed the whole picture that distributed computing used to present such as Grid computing, server client computing. Despite Cloud offers great benefits, it also introduces a myriad of security thr...
Wavelet-Local binary pattern based face recognition
Over the last twenty years face recognition has made immense progress based on statistical learning or subspace discriminant analysis. This paper investigates a technique to reduce features necessary for face recognition...
Reproduction of Remote Sensing Image Using Supervised Mode of Learning Using Artificial Neural Network
Remote sensing is the science of gathering information from a location that is distant from the source. Image analysis is the technique of extracting and interpreting meaningful information from a remotely sensed image....
A FUZZY BASED APPROACH FOR EARLY REQUIREMENT PRIORITIZATION
The importance of the prioritization in commercial software development has been analyzed by many researchers. The gathered requirements are required to be put into an order of some priority. In other words we can say th...
Performance Analysis of Handoff in CDMA Cellular System
Handoff mechanism is extremely important in cellular network because of the cellular architecture employed to maximize spectrum utilization. This unique feature has driven the rapid growth in the mobile network industry,...