Details

Applicability of Identified File Security Techniques in Enhancing the Security Safeguards in Cloud Computing

Muskan Talreja

Barkatullah University, Bhopal, Madhya Pradesh, India

113-119

Vol: 7, Issue: 3, 2017

Receiving Date: 2017-06-15 Acceptance Date:

2017-07-25

Publication Date:

2017-08-10

Download PDF

Abstract

Security is necessary for sharing fragile Information in the cloud. Utilizing the real key makes the framework share the delicate Information without moving Keys for every single record. This framework employments Hilter kilter encryption standard for scrambling all the The Information followed by open key encryption. The users will get their data retrieved once they put the private key as well as a master key that they received from the sender. if the key is hacked during transmission, the suspicious attacker will not be able to get the data to decrypt as the data is secured by the private key.It is not mandatory to share key for each and every document because the user can decrypt the file using a master key. All information and data are extracted by the master secret key. so the data protected in different places, and user can use it anywhere.

Keywords: File Security Techniques; cloud computing; Advanced Encryption Standard (AES)

References

  1. L. Badger, T. Grance, R. Patt-Corner and J. Voas, “Cloud computing synopsis and recommendations (draft), nist special publication 800-146”, Recommendations of the National Institute of Standards and Technology, Tech. Rep. (2011).
  2. U. Khalid, A. Ghafoor, M. Irum, and M. A. Shibli, “Cloud based secure and privacy enhanced authentication & authorization protocol”, Procedia Computer Science, 22, (2013), 680-688.
  3. T. Acar, M. Belenkiy and A. Küpçü, “Single password authentication”, Computer Networks, 57(13), (2013), 2597-2614
  4. G. Wang, Q. Liu, J. Wu and M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers”, Computers & Security, 30(5), (2011), 320-331
  5. C. I. Fan and S. Y. Huang, “Controllable privacy preserving search based on symmetric predicate encryption in cloud storage”, Future Generation Computer Systems, 29(7), (2013), 1716-1724.
  6. D. W. Chadwick and K. Fatema, “A privacy preserving authorisation system for the cloud”, Journal of Computer and System Sciences, 78(5), (2012), 1359-1373
  7. M. Hange, “Security Recommendations for Cloud Computing Providers”, Federal Office for Information Security (2011).
  8. G. Brunette and R. Mogull, “Security guidance for critical areas of focus in cloud computing v2”, Cloud Security Alliance, (2009), 1-76.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.