Applicability of Identified File Security Techniques in Enhancing the Security Safeguards in Cloud Computing
Muskan Talreja
Barkatullah University, Bhopal, Madhya Pradesh, India
Receiving Date:
2017-06-15
Acceptance Date:
2017-07-25
Publication Date:
2017-08-10
Download PDF
Abstract
Security is necessary for sharing fragile Information in the cloud. Utilizing the real key makes the framework share the delicate Information without moving Keys for every single record. This framework employments Hilter kilter encryption standard for scrambling all the
The Information followed by open key encryption. The users will get their data retrieved once they put the private key as well as a master key that they received from the sender. if the key is hacked during transmission, the suspicious attacker will not be able to get the data to decrypt as the data is secured by the private key.It is not mandatory to share key for each and every document because the user can decrypt the file using a master key. All information and data are extracted by the master secret key. so the data protected in different places, and user can use it anywhere.
Keywords:
File Security Techniques; cloud computing; Advanced Encryption Standard (AES)
References
- L. Badger, T. Grance, R. Patt-Corner and J. Voas, “Cloud computing synopsis and recommendations (draft), nist special publication 800-146”, Recommendations of the National Institute of Standards and Technology, Tech. Rep. (2011).
- U. Khalid, A. Ghafoor, M. Irum, and M. A. Shibli, “Cloud based secure and privacy enhanced authentication & authorization protocol”, Procedia Computer Science, 22, (2013), 680-688.
- T. Acar, M. Belenkiy and A. Küpçü, “Single password authentication”, Computer Networks, 57(13), (2013), 2597-2614
- G. Wang, Q. Liu, J. Wu and M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers”, Computers & Security, 30(5), (2011), 320-331
- C. I. Fan and S. Y. Huang, “Controllable privacy preserving search based on symmetric predicate encryption in cloud storage”, Future Generation Computer Systems, 29(7), (2013), 1716-1724.
- D. W. Chadwick and K. Fatema, “A privacy preserving authorisation system for the cloud”, Journal of Computer and System Sciences, 78(5), (2012), 1359-1373
- M. Hange, “Security Recommendations for Cloud Computing Providers”, Federal Office for Information Security (2011).
- G. Brunette and R. Mogull, “Security guidance for critical areas of focus in cloud computing v2”, Cloud Security Alliance, (2009), 1-76.
Back