Data Security Algorithms for Cloud Storage System using Cryptographic Method

نویسنده

  • Inder Singh
چکیده

Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. In order to address this problem, we proposed an efficient data security method using cryptographic techniques. Thus, the proposed method not only encrypts the sensitive data, but also detects the dishonest party to access the data using combined hash functions. We have analyzed the proposed method in terms of storage, communication and computational overheads. The result shows that the proposed security method is more efficient than the existing security system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Enhanced Security Architecture for Cloud Data Security

Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability de...

متن کامل

Performance Evaluation Of New Hybrid Encryption Algorithms To Be Used For Mobile Cloud Computing

Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized computing platforms located in clouds, which are then accessed over the wireless connection based on a thin native client to overcome on the limitation of mobile devices and uses the main advantage of cloud computing. As mobile cloud computing continues to grow, so ...

متن کامل

Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data

Received Jun 29, 2017 Revised Nov 23, 2017 Accepted Dec 17, 2017 The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may origin animmense loss to the enterprises. Duplication detection plays a very main role in data management. Data...

متن کامل

Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms

Cloud computing is the next generation architecture, which focuses on IT enterprise, through which potentiality on delivery of services in an infrastructure is increased. By the means of cloud computing investing in new infrastructure, training new personnel and licensing new software descends. It offers the massive storage to the users. It moves the application databases to centralized data ce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014