GLEnc Algorithm to Secure Data in Public Cloud Environment

被引:0
作者
George, Lalu P. [1 ]
Amalarethinam, D. I. George
Chandran, Anjana S. [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli 620020, India
[2] SCMS Sch Technol & Management, Cochin 683501, Kerala, India
来源
2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2018年
关键词
Cloud computing; Cloud security; Public cloud; Data protection in public cloud; Data Protection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, technology has evolved throughout the years. Data storage has become transparent after the commencement of the internet. The emergence of cloud computing allows data stored at different locations with different servers using internet and central remote servers. The advantage of cloud computing has transformed the method distributed computing used in the past. Data security is totally maintained by means of encryption. Encryption and decryption are the key elements where hidden data is transformed into an undecipherable code, while decryption is the exact opposite resulting in the original data. The proposed algorithm is performed prior to the arrival of data in the cloud storage. Here the real plain text undergoes different types of splitting and dividing techniques. Three keys are employed at different stages to get highly encrypted data. This paper presents to protect data in the Public Cloud Environment.
引用
收藏
页码:2018 / 2022
页数:5
相关论文
共 50 条
  • [1] Convergent encryption enabled secure data deduplication algorithm for cloud environment
    Ahmad, Shahnawaz
    Arif, Mohd.
    Ahmad, Javed
    Nazim, Mohd.
    Mehfuz, Shabana
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (21)
  • [2] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [3] Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review
    Mamta
    Khare, Mayank Deep
    Yadav, Chandra Shekhar
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017), 2017, : 413 - 416
  • [4] Framework for Secure Data Sharing In Dynamic Group Using Public Cloud
    Dangur, Jueeli
    Jaybhaye, S. M.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 199 - 204
  • [5] A Comprehensive Review on Secure Data Sharing in Cloud Environment
    Kotha, Sita Kumari
    Rani, Meesala Shobha
    Subedi, Bharat
    Chunduru, Anilkumar
    Karrothu, Aravind
    Neupane, Bipana
    Sathishkumar, V. E.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (03) : 2161 - 2188
  • [6] A Comprehensive Review on Secure Data Sharing in Cloud Environment
    Sita Kumari Kotha
    Meesala Shobha Rani
    Bharat Subedi
    Anilkumar Chunduru
    Aravind Karrothu
    Bipana Neupane
    V E Sathishkumar
    Wireless Personal Communications, 2022, 127 (3) : 2161 - 2188
  • [7] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    K. L. Neela
    V. Kavitha
    Cluster Computing, 2018, 21 : 115 - 124
  • [8] SECURE DIGITAL DATA VISUAL SHARING SCHEMES IN MULTI-OWNER PUBLIC CLOUD ENVIRONMENT APPLICATIONS
    Babu, Chekka ratna
    Babu, Raveendra
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2025, 26 (01): : 84 - 95
  • [9] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    Neela, K. L.
    Kavitha, V.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 115 - 124
  • [10] Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud
    Huang, Qinlong
    Yang, Yixian
    Fu, Jingyi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (04) : 1013 - 1025