Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage
نویسندگان
چکیده
With the vast development in cloud computing model, various organizations and individuals often deploy the cloud without reviewing the security policies and procedures which can cause great risk in their business. Securing data in cloud storage becomes a challenging task not only for the cloud user but also to the Cloud Service Provider (CSP). Storing secret data in unencrypted form is susceptible to easy access to both the unauthorized people and the CSP. Standard encryption algorithms require more computational primitives, storage space and cost. Therefore protecting cloud data with minimal computation and storage space is of paramount significance. The Securing Portable Document Format file Using Extended Visual Cryptography (SPDFUEVC) technique proposes efficient storage to achieve data confidentiality and integrity verification with minimal computation, time complexity and storage space.
منابع مشابه
Efficient Deduplication with Security Using Jenkins and Recovery Techniques
Data deduplication is a method of tumbling stowage needs by eliminating redundant data. Only one unique occasion of the data is actually retained on storage broadcasting. Redundant data is replaced with a pointer to the unique data copy and it has been widely used in cloud packing to reduce the amount of storage space and save bandwidth. To protect the concealment of sensitive data while suppor...
متن کاملCustom Based Protocol for Information Retrieval in Cloud Computing
Prominent issue in cloud computing is security in which storing and retrieving the data in a third party’s cloud system and public auditing scheme which causes serious problems and conflict over data confidentiality during the transaction of data. Though there are number of methods are available to overcome this problem like cryptography, key encryption etc. The general encryption schemes prote...
متن کاملIntrusion Detection on Cloud Applications
Cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. So, cloud environment always remains vulnerable to attacks. The framework serves as an excellent platform for making cloud services intrusion tolerant. The feasibility of the framework has been tested by making cloud’s Infrastructure as a Service (IaaS) and Data Storage S...
متن کاملSecure Data Storage with Deduplication and Efficient Convergent Key Management
Businesses and consumers are becoming increasingly conscious of the value of secure archival data storage. Most of the organization need to outsource their confidential data including sensitive information to cloud. One of the greatest challenge todays cloud storage services facing is the management of ever increasing volume of data and most importantly security. This paper introduces a techniq...
متن کاملSecure and trustworthy file sharing over cloud storage using eid tokens
This paper presents a multi-platform, open-source application that aims to protect data stored and shared in existing cloud storage services. The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens. All peer to peer dialogs to exchange cryptographic material is implement...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017