Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

Cloud computing in the domain of distributed systems introduces many challenges in the day-to-day life. One of the main challenges is data security and privacy. Security on cloud data can be enhanced using dual encryption. Different encryption techniques such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), Triple DES, Exclusive-OR (XOR), Rivest, Shamir and Adleman (RSA) are used for this purpose. The encryption techniques such as Exclusive-OR (XOR) and Advanced Encryption Standard (AES) can be used together to perform dual encryption on the cloud data. By utilizing cloud to re-sign the blocks that were previously signed by the revoked user on behalf of existing users, efficient user revocation can be performed. Auditing by the Third party auditor ensures the integrity of data stored in the cloud.

Authors and Affiliations

Keywords

Related Articles

Implementation of Gesture Recognition System for Home Automation using FPGA and ARM Controller

New natural methods of control are needed due to the increase in the number of industrial and home appliances that must be controlled. In this paper presents releasable fpga based hand gesture recognition system is propo...

Review of Key Management Schemes in WSNs

In this research paper we have done exhaustive study on latest key management schemes that are used in securing the WSN, however our focused in our study have been on the aspect of energy consumption due to implementatio...

Household Appliance Scheduling

Many countries in the world have a variable power rate, which a consumer can exploit to reduce electricity cost for running the appliances accordingly. In this greedy consumption, power surge is possible during that low...

A Study on 360-Degree Feedback In Educational University With Reference To Bhubaneswar, Odisha, India

Abstract: Managers and leaders within organizations use 360-degree feedback surveys to get a better understanding of their strengths and weaknesses. The 360-degree feedback system automatically tabulates the results and...

Clinical Development of Biomarker To Detect Oral Carcinoma In Relation To Genetic Polymorphism At MMP-9

Premalignant/potentially malignant oral lesion and condition such as oral submucous fibrosis are known to be transformed into oral cancer. The malignant transformation is often associated with genetic polymorphism which...

Download PDF file
  • EP ID EP364157
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

(2015). Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-364157