Data Security Using 512 Bits Symmetric Key Based Cryptography In Cloud Computing System

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Symmetric Key Based Framework for Data Security in Cloud Computing

-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------Cloud computing offers the on demand computational infrastructure to the users which has the potential to decrease the huge cost to build IT based services. It can provide ubiquitous, convenient data storage facility. It is a significant issue as the whole da...

متن کامل

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...

متن کامل

Elliptic curve cryptography in cloud computing security

Cloud computing is a technological advancement that has been growing swiftly during the last decade. In simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous access to services through the Internet. It enables consumers to access applications and services that reside on remote servers, without having to allocate large amounts of storage space on the...

متن کامل

Data Replication-Based Scheduling in Cloud Computing Environment

Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...

متن کامل

Enhanced Security System Using Symmetric Encryption and Visual Cryptography

With the rapid development of internet, transfer of data reliably and securely has become one of the challenges. In this paper we have introduced a novel visual cryptographic technique. This method is applicable for both Bitmap Color and Grayscale images. This method uses the concept of Residual Number System (RNS) based on Chinese Remainder Theorem (CRT) for share creation and share stacking o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Science and Technology

سال: 2019

ISSN: 2005-4238,2207-6360

DOI: 10.33832/ijast.2019.129.01