GLEnc Algorithm to Secure Data in Public Cloud Environment

被引:0
作者
George, Lalu P. [1 ]
Amalarethinam, D. I. George
Chandran, Anjana S. [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli 620020, India
[2] SCMS Sch Technol & Management, Cochin 683501, Kerala, India
来源
2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2018年
关键词
Cloud computing; Cloud security; Public cloud; Data protection in public cloud; Data Protection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, technology has evolved throughout the years. Data storage has become transparent after the commencement of the internet. The emergence of cloud computing allows data stored at different locations with different servers using internet and central remote servers. The advantage of cloud computing has transformed the method distributed computing used in the past. Data security is totally maintained by means of encryption. Encryption and decryption are the key elements where hidden data is transformed into an undecipherable code, while decryption is the exact opposite resulting in the original data. The proposed algorithm is performed prior to the arrival of data in the cloud storage. Here the real plain text undergoes different types of splitting and dividing techniques. Three keys are employed at different stages to get highly encrypted data. This paper presents to protect data in the Public Cloud Environment.
引用
收藏
页码:2018 / 2022
页数:5
相关论文
共 50 条
  • [41] PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment
    Imene Bouleghlimat
    Souheila Boudouda
    Salima Hacini
    Arabian Journal for Science and Engineering, 2024, 49 : 3225 - 3239
  • [42] A CSO-based approach for secure data replication in cloud computing environment
    N. Mansouri
    M. M. Javidi
    B. Mohammad Hasani Zade
    The Journal of Supercomputing, 2021, 77 : 5882 - 5933
  • [43] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258
  • [44] PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment
    Bouleghlimat, Imene
    Boudouda, Souheila
    Hacini, Salima
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3225 - 3239
  • [45] A hybrid algorithm for secure cloud computing
    Das D.
    International Journal of Wireless and Mobile Computing, 2020, 18 (02) : 116 - 122
  • [46] Data Integrity and Security in Cloud Environment Using AES Algorithm
    Thiyagarajan, B.
    Kamalakannan, R.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [47] Web data mining algorithm based on cloud computing environment
    Liu, Yunpeng
    Gu, Xiaolong
    Zhang, Jie
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (04) : 359 - 368
  • [48] Enhanced Anonymization Algorithm to Preserve Confidentiality of Data in Public Cloud
    Irudayasamy, Amalraj
    Lawrence, Arockiam
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2014), 2014, : 86 - 91
  • [49] Key Insertion and Splay Tree Encryption Algorithm for Secure Data Outsourcing in Cloud
    Rani, A. Mercy Gnana
    Marimuthu, A.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 92 - +
  • [50] Research of Data-Aiming Mining Algorithm in Cloud Environment
    Jin, Jiangang
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (04): : 87 - 94