International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 259

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.4 / 10


     

Enhancing Cloud Security and Integrity byUsing multiple Encryption Algorithms and Stripping

Shelna Valsan K. P., Varshap


Abstract: Cloud computing is the delivery of computing as a service rather than a product or service, whereby shared computing resources, software, and infrastructures are provided to computers and other devices as a utility like the electricity grid over a network typically the Internet. A cloud is a combination of hardware, networks, storage, and services that helps in delivering computing as a service. In Cloud computing technology there are a set of important issues, which include issues of privacy, security, reliability. But the most important between them is security and how cloud provider assures it. Cloud computing has several customers such as ordinary users, and enterprises who have different motivation to move to cloud. For enterprises the most important problem is also security but with different vision. This paper discusses about the Cipher Cloud. Cipher Cloud lets users keep their data confidentially on public cloud. To achieve this, the Cipher Cloud uses a two-step encryption process, in which all the data sent from a client to a cloud server or vice versa is kept totally encrypted and confidential. The thorough security controls needed to protect the most sensitive data may not be guaranteed in public cloud computing architectures. This paper suggests unique encryption techniques, and also provide stripping technique in which data is segmented and stored in different locations (buckets/storage directories) in the cloud. Thus gives more security which is competitive and economical to private cloud models.


Keywords: Cloud computing, Encryption algorithms, Data segmentation, Data stripping, Data security enhancement


Edition: Volume 4 Issue 4, April 2015


Pages: 1065 - 1068



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Shelna Valsan K. P., Varshap, "Enhancing Cloud Security and Integrity byUsing multiple Encryption Algorithms and Stripping", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 1065-1068, https://www.ijsr.net/getabstract.php?paperid=SUB153202, DOI: https://www.doi.org/10.21275/SUB153202



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1349 - 1363

IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing

Ponnarasan Krishnan

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1885 - 1890

A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI

Devansh Dave

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1598 - 1601

A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web

Supriya S. Sankpal, Rupali A. Mahajan

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

Share this Article
Top