A Secure and Adaptable Cloud Data Encryption System using cryptography: A Review
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
Security of data in cloud is one of the major issues which acts as an obstacle in the implementation of cloud computing. Cloud storage is an important part of cloud computing, which is used to achieve the target of storing data in the cloud. This paper proposes a highly active and efficient cloud security model. Our cloud security model plans to keep the most critical data security in cloud computing at different levels. The different levels are: user level, cloud service provider level, third party level and network intruder level. Data is protected against all level. To maintain data privacy re-encryption is performed with the help of third party and for data integrity Hash Based Message authentication code is generated on encrypted data. Also, the proposed model uses hash codes to tackle the issues regarding the integrity of the data at the public cloud. Proposed model is divided into two phases and consists of data owner, third party, cloud service provider and user. The phase’s one is uploading or Data Storage and another one is Downloading or Data Retrieval.
Authors and Affiliations
Anamika Sirohi
A Comparative Study & Analysis of Image Restoration by Non Blind Technique
The process of retrieving and analyzing the pictorial information by a digital computer is known as digital image processing. Vision is the foremost trusted source of information compare to other human perceptions. And...
The Big Data analytics with Hadoop
The big data is a huge number of data ,all these data comes from the daily uses of human life like telephone, mobiles, travelling, shopping, computer, organization data which are to be store, manage and executing the da...
Design of Endplate to Improve the Rate of Pressure Distribution in Fuel Cell
A proper stacking design and cell assembly are important to the performance of fuel cells. The cell assembly will affect the contact behaviour of the bipolar plates with the membrane electrode assembly (MEA). Not enough...
Improved Marker Controlled Watershed Algorithm for Novel Applications
Counting objects is primary task in biomedical field, food & beverage industry. To overcome this issue we present a marker controlled watershed algorithm and thresholding which provides 99.9% results. Watershed algorith...
Trust Based Service in Social Networks - A Survey
Internet of things is going to make a world where physical objects are unlined in corporated into information networks in order to render advanced and intelligent services for human being. Trust management plays a vital...