To Increase Security and Privacy, the QAES Encryption Algorithm is used for Storage of Data for Cloud Computing

被引:0
作者
Rani, Geetha E. [1 ]
Chetana, D. T. [1 ]
机构
[1] GITAM Univ, Comp Sci & Engn, Bengaluru, India
来源
2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON | 2022年
关键词
Encryption; Decryption; Data Security; Cloud; Access Control; CSP; AWS; QAES;
D O I
10.1109/INDICON56171.2022.10039874
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper an asymmetric key algorithm is used towards provide effective safety measures. At first new files encrypted with the QAES algorithm at the end of the data holder and then stored in the cloud. Then the encrypted data request delivered towards data owner. The user and the sender analyses data then direct encoded documents towards cloud. Later data will be cleared of encryption using the key. The data user receives data that has already been encrypted. If a data user fails to retrieve data, they should re-request. The effect of this method is to provide improved security. Similarly, Period it takes on the way to compile files faster than it even now is. Brute force attacks are not possible in this way, as we use a QAES algorithm that provides additional security.
引用
收藏
页数:8
相关论文
共 19 条
[1]  
Andrzej M., 2011, PRINCIPLES PARADIGMS
[2]  
Azam Muhammad, 2022, HINDAWI J MATH, DOI [10.1155/2022/970446, DOI 10.1155/2022/970446]
[3]  
CSA, 2012, SEC A A SERV GUID CR
[4]  
Cuzzocrea A., 2022, Proc. Comput. Sci., V198, P112
[5]   Preserving Data Security in Cloud Environment Using an Adaptive Homomorphic Blockchain Technique [J].
Devmane, Vidyullata ;
Lande, B. K. ;
Joglekar, Jyoti ;
Hiran, Dilendra .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (08) :10381-10394
[6]   Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study [J].
Gill, Sajid Habib ;
Razzaq, Mirza Abdur ;
Ahmad, Muneer ;
Almansour, Fahad M. ;
Ul Haq, Ikram ;
Jhanjhi, N. Z. ;
Alam, Malik Zaib ;
Masud, Mehedi .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (01) :117-128
[7]  
HARNOS Patrik, SCI MILITARY, P17
[8]  
Jasim Omer K., 2014, INT J GRID HIGHER PE, V6
[9]  
Korac D, 2022, J SUPERCOMPUT, V78, P3325, DOI 10.1007/s11227-021-03981-4
[10]   THE PROBLEM OF LEGAL REGULATION OF THE SECURITY OF A PERSON, SOCIETY, STATE IN THE FORMATION OF THE INFORMATION SOCIETY IN UKRAINE [J].
Marushchak, Anatolii ;
Petrov, Stanislav ;
Romanov, Mykola ;
Balashova, Oksana .
EUROPEAN JOURNAL OF TRANSFORMATION STUDIES, 2021, 9 (01) :101-116