GLEnc Algorithm to Secure Data in Public Cloud Environment

被引:0
作者
George, Lalu P. [1 ]
Amalarethinam, D. I. George
Chandran, Anjana S. [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli 620020, India
[2] SCMS Sch Technol & Management, Cochin 683501, Kerala, India
来源
2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2018年
关键词
Cloud computing; Cloud security; Public cloud; Data protection in public cloud; Data Protection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, technology has evolved throughout the years. Data storage has become transparent after the commencement of the internet. The emergence of cloud computing allows data stored at different locations with different servers using internet and central remote servers. The advantage of cloud computing has transformed the method distributed computing used in the past. Data security is totally maintained by means of encryption. Encryption and decryption are the key elements where hidden data is transformed into an undecipherable code, while decryption is the exact opposite resulting in the original data. The proposed algorithm is performed prior to the arrival of data in the cloud storage. Here the real plain text undergoes different types of splitting and dividing techniques. Three keys are employed at different stages to get highly encrypted data. This paper presents to protect data in the Public Cloud Environment.
引用
收藏
页码:2018 / 2022
页数:5
相关论文
共 50 条
  • [21] Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment
    Quang Hieu Vu
    Colombo, Maurizio
    Asal, Rasool
    Sajjad, Ali
    El-Moussa, Fadi Ali
    Dimitrakos, Theo
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 638 - 642
  • [22] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    Hema, V. Sri Vigna
    Kesavan, Ramesh
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (02) : 1021 - 1035
  • [23] ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment
    V. Sri Vigna Hema
    Ramesh Kesavan
    Wireless Personal Communications, 2019, 108 : 1021 - 1035
  • [24] Secure Sensor Data Management Model in a Sensor - Cloud Integration Environment
    Saha, Sayantani
    INTERNATIONAL CONFERENCE ON 2015 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2015, : 158 - 163
  • [25] Efficient Secure and Private Healthcare Data Transmission and Allocation in Cloud Environment
    Buddesab
    Yashaswini, M. S.
    Thriveni, J.
    Venugopal, K. R.
    2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 153 - 158
  • [26] Public auditing for shared cloud data with efficient and secure group management
    Tian, Hui
    Nan, Fulin
    Jiang, Hong
    Chang, Chin-Chen
    Ning, Jianting
    Huang, Yongfeng
    INFORMATION SCIENCES, 2019, 472 : 107 - 125
  • [27] Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment
    Namasudra, Suyel
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2289 - 2300
  • [28] Secure and efficient data access control in cloud computing environment: A survey
    Namasudra, Suyel
    Roy, Pinki
    MULTIAGENT AND GRID SYSTEMS, 2016, 12 (02) : 69 - 90
  • [29] A hybrid approach to secure and compress data streams in cloud computing environment
    Abdo, A.
    Karamany, Taghreed S.
    Yakoub, Ahmed
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (03)
  • [30] Cloud Secure Resource Sharing Algorithm from Object Based Sharable Environment
    Moghe, Uday
    Chaturvedi, Brajesh
    Lakkadwala, Prashant
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,