Downloads: 113 | Views: 259
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.4 / 10
Enhancing Cloud Security and Integrity byUsing multiple Encryption Algorithms and Stripping
Shelna Valsan K. P., Varshap
Abstract: Cloud computing is the delivery of computing as a service rather than a product or service, whereby shared computing resources, software, and infrastructures are provided to computers and other devices as a utility like the electricity grid over a network typically the Internet. A cloud is a combination of hardware, networks, storage, and services that helps in delivering computing as a service. In Cloud computing technology there are a set of important issues, which include issues of privacy, security, reliability. But the most important between them is security and how cloud provider assures it. Cloud computing has several customers such as ordinary users, and enterprises who have different motivation to move to cloud. For enterprises the most important problem is also security but with different vision. This paper discusses about the Cipher Cloud. Cipher Cloud lets users keep their data confidentially on public cloud. To achieve this, the Cipher Cloud uses a two-step encryption process, in which all the data sent from a client to a cloud server or vice versa is kept totally encrypted and confidential. The thorough security controls needed to protect the most sensitive data may not be guaranteed in public cloud computing architectures. This paper suggests unique encryption techniques, and also provide stripping technique in which data is segmented and stored in different locations (buckets/storage directories) in the cloud. Thus gives more security which is competitive and economical to private cloud models.
Keywords: Cloud computing, Encryption algorithms, Data segmentation, Data stripping, Data security enhancement
Edition: Volume 4 Issue 4, April 2015
Pages: 1065 - 1068
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 1885 - 1890A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI
Devansh Dave
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1598 - 1601A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web
Supriya S. Sankpal, Rupali A. Mahajan
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2425 - 2428Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme
Sneha A.Deshmukh, P.B.Sambhare