Data Confidentiality and Security in Cloud Computing Using KIST Algorithm

Abstract

Now days quickly expanded utilization of cloud computing in the numerous association and IT commercial industries and furnishes latest software solution with cost effective. So the cloud computing give us numerous of advantages with minimum cost and of information openness through Internet. The guaranteeing security risk of the cloud computing is the part in the distributed computing environment, the advancing, the evolving quintessence is cloud computing, that is gainful in cost effective parts, such as, ability inflexible computing, down the time period to advertise and in adequate computing power. By utilizing the complete capacity of cloud computing, information are transmitted, prepared and put away on the outside cloud administration suppliers. The truth of the matter is that, the proprietor of the information is feeling to a great degree unconfident to find their information external to their own particular control. Security and Secrecy of information put away in the cloud are key setbacks in the range of of Cloud computing. Security and Secrecy are the key problem for cloud storage. This paper proposes a KIST encryption calculation to focus on the security and Secrecy problem in cloud storage furthermore packed figure content information to ensure the information put away in the cloud

Authors and Affiliations

Adesh V. Bhabad

Keywords

Related Articles

Implementation of A Cross Platform Configuration Manager for Automating Various Tasks Involved in Wild fly Server

Cloud computing has revolutionized the computing landscape by providing on demand, pay-as-you-go access to elastically scalable resources. Many applications are now being migrated from on-premises data centers to public...

Low Voltage Low Dropout Regulator with Current Splitting Technique

Integrated regulators are used for power management in modern portable devices. There are many primary regulators and post regulators which converts high dc voltages, but they are unable to work on low voltage with low q...

Study on Strongly Pseudo Irregular Fuzzy Graphs

In this paper, Some results on Strongly pseudo Irregular Fuzzy Graphs and Strongly pseudo total Irregular Fuzzy Graphs are established. Comparative study between Strongly pseudo Irregular Fuzzy Graphs and Strongly pseudo...

PFC Zeta Converter for Speed Control of PMBLDC Motor Drive

This paper presents a Zeta DC-DC converter as a power factor correction (PFC) converter which is operated in voltage control mode for speed control of a permanent magnet brushless DC motor (PMBLDCM). The proposed convert...

Screening of Phytochemical and In Vitro Antioxidant Efficacy of Vitex negundo L. leaf Extract

Objective: The present study was carried out to evaluate the qualitative and quantitative phytochemical and In vitro antioxidant activities of methanolic leaf extract of vitex negundo. Materials and Methods: Vitex negund...

Download PDF file
  • EP ID EP243998
  • DOI -
  • Views 76
  • Downloads 0

How To Cite

Adesh V. Bhabad (2016). Data Confidentiality and Security in Cloud Computing Using KIST Algorithm. International journal of Emerging Trends in Science and Technology, 3(5), 3831-3837. https://europub.co.uk/articles/-A-243998