Hybrid Approach to Enhance Data Security on Cloud

被引:0
作者
Saxena, Pratishtha [1 ]
Yadav, Samarjeet [1 ]
Dayal, Neelam [1 ]
机构
[1] AKTU, Dept Comp Sci & Engn, Ctr Adv Studies, Lucknow, Uttar Pradesh, India
来源
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019 | 2020年 / 89卷
关键词
Cloud computing; Data security; RSA algorithm; MD5;
D O I
10.1007/978-981-15-0146-3_69
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a label for the delivery of hosted services on the Internet. The first challenge in the cloud computing is security, and the second challenge is the large size of the file stored on the cloud. Today, cloud is in young age and used too much for storing the data. So, security is a major concern. Security endures a primary concern for businesses regarding cloud selection, usually public cloud selection. Public cloud service providers share their hardware infrastructure among the numerous customers, as the public cloud has an environment of multi-tenant. Multi-tenancy is an important feature of the cloud computing but also is prone to several vulnerabilities. From the end-user aspect, cloud computing looks very insecure from the perspective of privacy. In this paper, a technique REM (RSA algorithm, Elgamal algorithm, MD5 technique) is proposed by which we can provide better security to our data over the cloud. Unlike the previous techniques, which maintained only one pillar of security, this paper maintains two pillars of security, i.e., confidentiality and integrity along with reducing the size of the file.
引用
收藏
页码:735 / 743
页数:9
相关论文
共 12 条
[1]  
Albugmi A, 2016, INT CONF FUTURE GEN, P55
[2]  
Bhadauria R, 2014, ACTA TEHNICA CORVINI
[3]  
Gill R.D., 2018, International Journal of Applied Engineering Research, V13, P7388
[4]  
Gupta P, 2018, PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, P163, DOI 10.1109/CONFLUENCE.2018.8442788
[5]  
Jayalekshmi MB, 2015, INDIAN J SCI TECHNOL, V8, P128
[6]  
Kaur J, 2015, INT J APPL STUD PROD, V1, P27
[7]  
Mishra N., 2018, Soft Computing: Theories and Applications, P61
[8]  
Negi A., 2018, INT J COMPUT SCI ENG, V6, P215, DOI [10.26438/ijcse/v6i5.215220, DOI 10.26438/IJCSE/V6I5.215220]
[9]  
Rohini, 2018, PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), P60, DOI 10.1109/ICISC.2018.8398902
[10]  
Rong C, 2012, COMPUT ELECTR ENG