Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2017, Vol 16, Issue 3
Abstract
This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and Cloud based devices. Our security scheme is a novel architectural strategy that implements a full-stack architecture for the dispatching and management of data between several Cloud Service Providers (CSP) and any number of mobile devices. This strategy can promise data security needs for both mobile devices and cloud service providers without impacting the security requirements of the other party. While there are limitations in being truly secure, such as those recognized by WhiteHat security in their annual report[1], we believe that our security scheme can effectively circumvent potential threats and secure data through folding data using any number of encryption layers for every table and column of data to be stored. Through this approach, we have found our work to be applicable to a variety of different audiences within the cloud security space.
Authors and Affiliations
Stephen Rodriguez, Paolina Centonze
THEORETICAL APPROACH TO ONLINE MARKETING
The Internet is one of the first things leading technological developments. It provides easy accessibility to the products. These kind of developments led businesses to use the Internet intensely in marketing. Thus, onli...
In Search of a Better Heuristic Algorithm for Simplification of Switching Function - A Challenge to ESPRESSO
Finding minimum cost switching function is a n intractable problem. The number of prime implicant of a typical switching function is of the order of 3n [5][13]. When fitness function with respect to cost is the only goal...
An Image Encryption Scheme Using 2D Generalized Sawtooth Maps
In this paper, a new image encryption scheme based on 2D generalized sawtooth map is proposed. Utilizing the chaoticnature of 2D generalized sawtooth maps, image pixel positions are scrambled and image pixels gray values...
Advance Neighbor Embedding for Image Super Resolution
This paper presents the Advance Neighbor embedding (ANE) method for image super resolution. The assumption of the neighbor-embedding (NE) algorithm for single-image super-resolution Reconstruction is that the feature spa...
Service Oriented Load Balancing Framework in Computational Grid Environment
Grid computing or computational grid has become a vast research field in academics. It is a promising platform that provides resource sharing through multi-institutional virtual organizations for dynamic problem solving....