Downloads: 101 | Views: 302
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.9 / 10
A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Abstract: Cloud computing is a model for using a network of remote servers hosted on the Internet to store, manage and process data. It is a model for enabling widespread and convenient, on-demand access to shared computing resources. It focuses on maximizing the profitable of the shared resources. Cloud computing enables multiple users for accessing a single server to retrieve and update their data, no need to purchase a permit for the different application. In cloud computing, data security is a major issue. After uploading the data on the cloud, data owner has no rights to control the data. For securing the data, everyone wants to trust the third party for the mechanism. The paper proposed an algorithm that consists of data that get slices into different parts. Data present in each slice can encrypt by using a different algorithm. Moreover, the encryption key is applied to data before it stored on the cloud. The objective of our proposed scheme is to store data in a safe and secure manner to avoid data attacks. Another objective is reducing the cost and time required for storing the encrypted data on the cloud.
Keywords: Security, Authentication, Encryption, Decryption, Data attacks, Slicing,
Edition: Volume 4 Issue 12, December 2015
Pages: 1833 - 1836
DOI: https://www.doi.org/10.21275/NOV152397
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 11, November 2024
Pages: 404 - 406Comparative Analysis of Open-Source Encryption Tools: GnuPG vs. VeraCrypt
Ravi Kumar Singh, Vikalp, Dushyant Sharma, Aditya Pandey
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 772 - 776Cryptographic Algorithm to Augment Data Security
Vipin R Bharadwaj, Nalina V, Rithvik Mohan V
Downloads: 12 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021
Pages: 788 - 791A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas