A Novel Data Security Framework in Distributed Cloud Computing

被引:0
作者
Malgari, Vanaja [1 ]
Dugyala, Raman [2 ]
Kumar, Ashwani [2 ]
机构
[1] Vardhaman Coll Engn, Shamshabad, India
[2] Vardhaman Coll Engn, Comp Sci & Engn, Shamshabad, India
来源
2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019) | 2019年
关键词
Encryption; Decryption; Security; Symmetric; Asymmetric;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Now a day's everyone is using network to transmit the data. Even though the security has been increased the data is not still protected. So before sending the data through the network it has to encrypt so that data will be secured. In this paper to secure the data the combination of encryption algorithms is used that is known as hybrid encryption algorithm. It is the combination of symmetric (AES) and asymmetric (RSA) encryption algorithms. This hybrid encryption algorithm is to expand the security level to the data. For the encryption of sensitive data, both symmetric and asymmetric encryption techniques are important.
引用
收藏
页码:373 / 378
页数:6
相关论文
共 22 条
[1]  
Batra Mahul, 2018, INT J COMPUTER E JUN
[2]  
Bezawada Bruhadeshwar, 2017, SYMMETRIC KEY BASED
[3]  
Dugyala R., 2018, INT J ENG TECHNOL, V7, P42, DOI [10.14419/ijet.v7i4.6.20231, DOI 10.14419/IJET.V7I4.6.20231]
[4]  
Dugyala Raman, 2017, INT J APPL ENG RES, V12, P8270
[5]  
gupta Utkarsh, 2018, INT J RECENT RES ASP
[6]  
Kumar Ashwani, 2014, WSEAS Transactions on Signal Processing, V10, P212
[7]   Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection [J].
Kumar, Ashwani .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (03) :22-36
[8]  
Kumar A, 2017, PERTANIKA J SCI TECH, V25, P57
[9]  
Kumar Ashwani, 2018, INT J ENG TECHNOLOGY, V7, P39
[10]  
Kumar Ashwani, 2015, INDIAN J SCI TECHNOL, V8, P1