Data Confidentiality and Security in Cloud Computing Using KIST Algorithm

Abstract

Now days quickly expanded utilization of cloud computing in the numerous association and IT commercial industries and furnishes latest software solution with cost effective. So the cloud computing give us numerous of advantages with minimum cost and of information openness through Internet. The guaranteeing security risk of the cloud computing is the part in the distributed computing environment, the advancing, the evolving quintessence is cloud computing, that is gainful in cost effective parts, such as, ability inflexible computing, down the time period to advertise and in adequate computing power. By utilizing the complete capacity of cloud computing, information are transmitted, prepared and put away on the outside cloud administration suppliers. The truth of the matter is that, the proprietor of the information is feeling to a great degree unconfident to find their information external to their own particular control. Security and Secrecy of information put away in the cloud are key setbacks in the range of of Cloud computing. Security and Secrecy are the key problem for cloud storage. This paper proposes a KIST encryption calculation to focus on the security and Secrecy problem in cloud storage furthermore packed figure content information to ensure the information put away in the cloud

Authors and Affiliations

Adesh V. Bhabad

Keywords

Related Articles

Using Raspberry Pito Design Smart Mirror Applications

Smart mirrors, which proceed with the works today and will have its spot later on innovation, give both mirrorand PC supported data administrations to its clients. Because of the microcontroller cards lo...

No Development without Better Life for Rural Women - A Case of Tanzania

Tanzania has a broad scope for agricultural diversification and a great potential to enhance production through agricultural intensification. The country has 945,090 km of land and 40 million ha (i.e. 42%) is cultivatabl...

An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications

Now a days people facing many problems because of traffic. To avoid this problem VANET is used here.In this group signature is used in VANETs to realized unauthorized authentication. In the existing system, group signatu...

Micropropagation of Terminalia Arjuna Roxb., from Nursery Plant Material

An in vitro micropropagation system has been developed for Terminalia arjuna Roxb., an important Indian medicinal plant and non mulberry primary food plant of tropical tasar silkworm (Antheria mylitta Drury). Nodal segme...

Pre – Destining the Quality of Plastic Parts Produced By Injection Molding Method Using Computer Simulation Techniques

In this paper attempt has been made to eliminate the errors during each step while designing and analysis of the component to minimize the defects during manufacturing of the component. Air filter bottom box component wa...

Download PDF file
  • EP ID EP243998
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

Adesh V. Bhabad (2016). Data Confidentiality and Security in Cloud Computing Using KIST Algorithm. International journal of Emerging Trends in Science and Technology, 3(5), 3831-3837. https://europub.co.uk/articles/-A-243998