Abstract

Leveraging the Dual Layer in Enhancing the Data Security Safeguards in Cloud Environment

Anoushka Gupta

36-42

Vol: 11, Issue: 2, 2021

One of the significant benefits of distributed computing is dividing information between different organizations. Notwithstanding, this benefit itself has a danger to information. It is important to ensure communication to refute likely risks to the data. Encryption is a tremendously powerful instrument concerning securing information. This paper proposes another span of cryptographic double-layer encryption to make the information put away in the cloud safer and dependable. There are promptly accessible numerous different encryption methods accessible at present; however incapable of giving adequate security. This paper intends to propose a new encryption strategy named double encryption. It depends on the well-known encryption analysis, ais a symmetric-key study. We will offer an extra layer of rabbit calculation around encoded information, which will assist with giving greater protection from Brute force and one more sort of attack. Assuming that an interloper recognizes a solitary key of the cryptosystem, it isn't easy to unscramble the first message. This paper plans to recommend a viewpoint that is a twofold layer encryption technique to guarantee security in the cloud. This proposed twofold layer encryption will acquire the information while securing and participating in a cloud environment. This plan utilizes the incredible handling expertise of distributed computing and can proficiently guarantee cloud information protection and security. Shop around. The best Swiss iwc fake watches UK with high quality are here. Read more details if you want.
Wish you buy UK cheap rolex replica watches from the discounted website. They are suitable for both men and women.

Download PDF

http://doi.org/10.37648/ijrst.v11i02.004

    References

  1. Biswajita Datta, Akash Roy, Romit Dutta, Samir Kumar Bandyopadhyay “Secure Communication through Double Layer Security with Efficient Key Transmission” 2018 International Conference on Information Technology (ICIT) (IEEE)
  2. Dr. D.Usha, M. Subbbulakshmi “Double Layer Encryption Algorithm Key Cryptography for Secure Data Sharing in Cloud” International Journal of Scientific & Engineering Research Volume 9, Issue 5, May-2018
  3. Shivani Chauhan, Jyotsna, Janmejai Kumar, Amit Doegar “Multiple layer Text security using Variable block size Cryptography and Image Steganography” 3rd IEEE International Conference on 'Computational Intelligence and Communication Technology' (IEEE-CICT 2017)
  4. Gahan A V, Geetha D Devanagavi “An Empirical Study of Security Issues In Encryption Techniques” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 5 (2019)
  5. Ashok Kumar, Santhosha, A.Jagan “Two layer Security for data storage in cloud” 2015 1st International conference on futuristic trend in computational analysis and knowledge management (ABLAZE 2015)
  6. Naveen N, K.Thippeswamy “Security and Privacy Challenges Using Multi-Layer Encryption Approaches In Cloud Computing Environments” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8 June, 2019
  7. Afnan Ullah Khan, Manuel Oriol, Mariam Kiran, Ming Jiang, Karim Djemame “Security Risks and their Management in Cloud Computing” 2012 IEEE 4th International Conference on Cloud Computing Technology and Science
  8. F.Sabahi, “Virtualization-level security in cloud computing,” 3rd Int. 2011 IEEE Conf. Commun. Softw. Networks, pp. 250–254, 2011
  9. D. Descher, M., Masser, P., Feilhauer. and Huemer, and A. Klein “Retaining data control to the client in infrastructure clouds,” Int. Conf. Availability, Reliab. Secur. (pp. 9-16). IEEE., pp. pp. 9–16, 2009.
  10. Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.
  11. C. Modi, D. Patel, B. Borisaniya, M. Rajarajan, and A. Patel “A survey on security issues and solutions at different layers of Cloud computing,” J.Supercomputer., vol. 63, no. 2, pp. 561–592, 2013.
  12. L. Rodero-Merino, L. M. Vaquero, E. Caron, F. Desprez, and A. Muresan, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, no. 1, pp. 96–108, 2012.
  13. E. Mohamed, “Enhance data secure model for cloud computing,” Informatics Syst. (INFOS), 2012 8th Int. Conf., pp. 12–17, 2012
  14. J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics,” Build. Infrastruct. Cloud Secure., vol. 1, no. September 2011, pp. 3–22, 2014.
  15. P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
  16. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.

bandar alexistogel

alexistogel toto online

alexistogel livedraw hongkong

login alexistogel

alexistogel agen slot

Alexistogel Toto Macau

alexistogel

alexistogel macau

Alexistogel macau

alexistogel terpercaya

bandar togel hongkong

alexistogel slot online

Togel Hongkong

toto macau online

bandar toto macau

alexis togel macau

alexistogel slot

alexistogel gacor

alexistogel online

slot alexistogel

alexistogel slot

link alexistogel

bandar alexistogel

alexistogel link

alexistogel online

situs alexistogel

alexistogel toto

alexistogel casino

slot alexistogel

alexistogel bandar togel

link alternatif alexistogel

alexistogel bandar slot

alexistogel login

rtp alexistogel

alexistogel toto macau

alexistogel slot

alexistogel online

alexistogel daftar

alexistogel slot

alexistogel link alternatif

alexistogel bandar gacor

alexistogel terpercaya

Alexistogel Login

alexistogel

alexistogel slot dana

alexistogel bandar togel

alexistogel situs

alexistogel rtp

alexistogel slot

alexistogel daftar

alexistogel

alexistogel slot

alexistogel

alexistogel

alexistogel gacor

link alternatif alexistogel

alexistogel

alexistogel slot

alexistogel

alexistogel

Slot Online Alexistogel

link alternatif alexistogel

Alexistogel Login

slot online gacor

Hoki88 Slot Online

slot online gacor

slot online

slot online dana

slot gampang menang

slot88 online

bandar togel macau

bandar toto macau

togel sydney

Agen Slot Gacor

RTP Slot Online

slot online

Slot Online Gacor

slot gacor pg soft

situs slot online

bandar slot gacor

slot online resmi

bandar togel online

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 bola slot

bandarbola855 rtp

bandarbola855 slot online

bandarbola855 link

bandarbola855 bandar

bandarbola855 slot terpercaya

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 online

slot bandarbola855

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

bandarbola855 slot

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet slot

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

bandar iosbet gacor

liatogel

bandar liatogel

login liatogel

live draw hk liatogel

liatogel slot online gacor

liatogel totomacau

liatogel link

slot gacor

daftar slot online

bandar slot dana

slot ovo

slot gopay