A Novel Symmetric Key Cryptography Algorithm for Improving Privacy of Data in Cloud Servers
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
In this paper, a cryptography technique, Novel Symmetric Key Cryptography algorithm is used to improve the data security and access control in the environment of Cloud Computing. The users upload the personal data over the cloud. Security is mandatory for such type of outsourced data, so that users are confident while processing their private and confidential data. Modern technology suffers from computational problem of keys and there exchange. This paper emphasizes the different problems and issues that arise while using cloud services such as key generation, data security and authentication. The paper addresses these problems using access control technique which ensures that only the valid users can access their data. It proposes a RSA Key Exchange Protocol between cloud service provider and the user for secretly sharing a symmetric key for the secure data access that solves the problem of key distribution and management. The data security will be done using the proposed Novel Symmetric Key Cryptography (N-SKC) algorithm with the help of generated key. The proposed work done using Cloud is highly efficient and secure in the existing security models.
Authors and Affiliations
K Padmanaban, S Janani, R Panneer Selvi
An Efficient Searching and File Replication Consistency in Peer-to-Peer Networks
Unstructured Network with file sharing properties with peer-to-peer (P2P) is very popular in the market. Though it is so popular it produce flooding query messages and result a heavy network traffic and which may not...
One-to-Many Data Linkage By One-Class Clustering Tree
Data linkage is the task of identifying different entries that refer to the same entity across different data sources. The goal of the data linkage task is joining data sets that do not share a common identifier. Data...
Electro Alert : An automatic meter reading system with GPRS facility
The digital technology, the wireless communication, and the communication have significantly changed the electric meter generation from Traditional Meter to Automatic Meter. A high percentage of electricity revenue is l...
Abrupt Software Cost Estimation Technique Based on Basic Requirement
Software cost estimation is the process to measure the required effort and cost to build system. In the project management still it is one of the most difficult tasks. There is a lack of reliable estimation technique...
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...