Securing data in transit using data-in-transit defender architecture for cloud communication

被引:0
作者
Keerthana Nandakumar
Viji Vinod
Syed Musthafa Akbar Batcha
Dilip Kumar Sharma
Mohanraj Elangovan
Anjana Poonia
Suresh Mudlappa Basavaraju
Sanwta Ram Dogiwal
Pankaj Dadheech
Sudhakar Sengan
机构
[1] Dr. M.G.R Educational and Research Institute,Department of Computer Science
[2] Dr. M.G.R Educational and Research Institute,Department of Computer Applications
[3] M. Kumarasamy College of Engineering,Department of Information Technology
[4] Jaypee University of Engineering and Technology,Department of Mathematics
[5] K. S. Rangasamy College of Technology,Department of Computer Science and Engineering
[6] Sri Balaji College of Engineering & Technology,Department of Master of Computer Application
[7] East West Institute of Technology,Department of Information Science and Engineering
[8] Swami Keshvanand Institute of Technology,Department of Information Technology, Management & Gramothan (SKIT)
[9] Swami Keshvanand Institute of Technology,Department of Computer Science and Engineering, Management & Gramothan (SKIT)
[10] PSN College of Engineering and Technology,Department of Computer Science and Engineering
来源
Soft Computing | 2021年 / 25卷
关键词
Data in transit; Cloud security; Encryption; Ciphertext; Cloud service;
D O I
暂无
中图分类号
学科分类号
摘要
The advent of cloud infrastructure in which third-party cloud services may retain sensitive consumer and company data in storage environments underlines the need to advocate for encryption and multi-tenant shared processing as a primary security mechanism. Digital information movement, storage, and processing are widely defined in terms of "Data in Motion,” "Data at Rest," and "Data in Usage," respectively. The implementation of security methods for each of these states can be viewed similarly. Transit data applies to data when being moved from one source of data to another. Transit data contains data sent across the network from back-end clients, programs, and repositories. There could be two data centers inside the same organizational network in the cloud, as a member of completely separate networks. This paper presents a novel architecture data-in-transit defender (DiTD), to protect data in transit; DiTD provides a novel security framework based on high-performance cloud computing. This protocol enables more efficient use of the key strength and time of symmetric block encrypted data, public-key cryptography (PUKC), cryptographic hash, and brief key exchange function.
引用
收藏
页码:12343 / 12356
页数:13
相关论文
共 25 条
[1]  
Almogren A(2019)An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology Clust Comput 22 2309-2316
[2]  
Cramer R(2004)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J Comput 33 167-226
[3]  
Shoup V(2019)Internet of Things (IoT) mobile cloud cloudlet mobile IoT cloud fog mobile edge and edge emerging computing paradigms: Disambiguation and research directions J Netw Comput Appl 128 105-140
[4]  
Elazhary H(2015)Office in cloud: approach to authentication and authorization Recent Adv Commun Netw Technol Bentham Sci 4 49-55
[5]  
Gawannavar M(2020)Security considerations for internet of things: a survey SN Comput SCI 1 193-65
[6]  
Mandulkar P(2020)Ensuring user authentication and data integrity in multi-cloud environment Hum Cent Comput Inf Sci 10 15-18908
[7]  
Thandeeswaran R(2018)A novel framework for internet of knowledge protection in social networking services J Comput Sci 26 55-undefined
[8]  
Jeyanthi N(2020)Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption Soft Comput 24 18893-undefined
[9]  
Jurcut A(2020)Sengan Sudhakar, Krishnamoorthy Sujatha, Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture Microprocess Microsyst 78 103216-undefined
[10]  
Niculcea T(undefined)undefined undefined undefined undefined-undefined