GLEnc Algorithm to Secure Data in Public Cloud Environment

被引:0
作者
George, Lalu P. [1 ]
Amalarethinam, D. I. George
Chandran, Anjana S. [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli 620020, India
[2] SCMS Sch Technol & Management, Cochin 683501, Kerala, India
来源
2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2018年
关键词
Cloud computing; Cloud security; Public cloud; Data protection in public cloud; Data Protection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, technology has evolved throughout the years. Data storage has become transparent after the commencement of the internet. The emergence of cloud computing allows data stored at different locations with different servers using internet and central remote servers. The advantage of cloud computing has transformed the method distributed computing used in the past. Data security is totally maintained by means of encryption. Encryption and decryption are the key elements where hidden data is transformed into an undecipherable code, while decryption is the exact opposite resulting in the original data. The proposed algorithm is performed prior to the arrival of data in the cloud storage. Here the real plain text undergoes different types of splitting and dividing techniques. Three keys are employed at different stages to get highly encrypted data. This paper presents to protect data in the Public Cloud Environment.
引用
收藏
页码:2018 / 2022
页数:5
相关论文
共 50 条
  • [31] A Flexible and Adaptive Hybrid Algorithm for Secure Data Sharing in Cloud Computing
    Thushara, G. A.
    Bhanu, S. Mary Saira
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [32] A novel hybrid dwarf-based Archimedes optimization (HDAO) algorithm for preserving secure data in a cloud computing environment
    Alandjani, Gasim
    Soft Computing, 2024, 28 (23) : 13371 - 13387
  • [33] A Secure Architecture for Data Storage in the Cloud Environments
    Fu, Chuan
    Yang, Jun
    Liu, Zheli
    Jia, Chunfu
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 289 - 291
  • [34] A Comprehensive Study of Data Protection in Public Cloud Computing
    Trifa, Zied
    Amamou, Sonia
    Khmakhem, Maher
    36TH ANNUAL EUROPEAN SIMULATION AND MODELLING CONFERENCE, ESM 2022, 2022, : 57 - 62
  • [35] Efficient and Secure Nearest Neighbor Search Over Encrypted Data in Cloud Environment
    Upinder, Kaur
    Pushpa, R. Suri
    DATA SCIENCE AND ANALYTICS, 2018, 799 : 587 - 598
  • [36] A CSO-based approach for secure data replication in cloud computing environment
    Mansouri, N.
    Javidi, M. M.
    Mohammad Hasani Zade, B.
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (06) : 5882 - 5933
  • [37] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17) : 4573 - 4585
  • [38] Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment
    M. Suganya
    T. Sasipraba
    Journal of Cloud Computing, 12
  • [39] Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment
    Suganya, M.
    Sasipraba, T.
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [40] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Esther Daniel
    N. A. Vasanthi
    Cluster Computing, 2019, 22 : 1247 - 1258