Cryptography in the cloud: securing cloud data with encryption

被引:0
作者
Mani, A. [1 ]
Kakade, Kiran Shrimant [2 ]
Therasa, P. R. [3 ]
Vanitha, M. [4 ]
机构
[1] SA Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Symbiosis Int Deemed Univ SIU, Symbiosis Inst Management Studies SIMS, Fac Management, Pune, India
[3] RMK Engn Coll, Dept Comp Sci & Engn, Chennai, India
[4] Saveetha Engn Coll, Dept Elect & Commun Engn, Chennai 602105, India
关键词
cryptography; public key techniques; public key encryption;
D O I
10.1504/IJESDF.2024.140744
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing utilises dispersed networks to provide computational and storage capacities. It is a kind of efficient technology that is geared specifically for the field of information technology. The use of the Internet has made both accessing data stored in the cloud and recovering that data considerably simpler and more convenient. In a cloud-based system, the storage capacity may be increased by the service providers. In a distributed system, it is generally agreed upon that security is the most important quality to possess. Cryptography is a mechanism that protects data from being seen or accessed by unauthorised parties, such as hackers or snoops. Cloud computing allows its users to store a limitless amount of data and make strategic use of a variety of resources across several dispersed systems. This work offers a privacy-preserving enabled public auditing system and less execution time is required when compared with the other existing methods.
引用
收藏
页码:577 / 589
页数:14
相关论文
共 17 条
[1]   A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography [J].
Adee, Rose ;
Mouratidis, Haralambos .
SENSORS, 2022, 22 (03)
[2]  
Arora R., 2013, Int. J. Eng. Res. App, V3, P1922
[3]  
Batra M., 2018, International Journal Computer Eng. Appl., V12, P30
[4]  
Bindu B., 2018, Int. J. Adv. Res. Comput. Sci, V9, P773, DOI [10.26483/ijarcs.v9i2.5916, DOI 10.26483/IJARCS.V9I2.5916]
[5]  
Ebrahim MA, 2017, 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), P135, DOI 10.1109/ICCES.2017.8275292
[6]  
Harba ESI, 2017, ENG TECHNOL APPL SCI, V7, P1781
[7]  
Johnsson M., 2011, Technical report, IDE1108
[8]  
Khan A.A., 2013, International Journal of Computer Applications, V68, P7
[9]  
Kumar L., 2019, 4 INT C INT SMART IN, P1, DOI [10.1109/IoT-SIU.2019.8777503, DOI 10.1109/IOT-SIU.2019.8777503]
[10]  
MEKMC A., 2013, International Journal of Engineering and Science, V2, P14