Details

Leveraging the Dual Layer in Enhancing the Data Security Safeguards in Cloud Environment

Anoushka Gupta

Step by Step, Noida

36-42

Vol: 11, Issue: 2, 2021

Receiving Date: 2021-05-10 Acceptance Date:

2021-06-04

Publication Date:

2021-06-25

Download PDF

http://doi.org/10.37648/ijrst.v11i02.004

Abstract

One of the significant benefits of distributed computing is dividing information between different organizations. Notwithstanding, this benefit itself has a danger to information. It is important to ensure communication to refute likely risks to the data. Encryption is a tremendously powerful instrument concerning securing information. This paper proposes another span of cryptographic double-layer encryption to make the information put away in the cloud safer and dependable. There are promptly accessible numerous different encryption methods accessible at present; however incapable of giving adequate security. This paper intends to propose a new encryption strategy named double encryption. It depends on the well-known encryption analysis, ais a symmetric-key study. We will offer an extra layer of rabbit calculation around encoded information, which will assist with giving greater protection from Brute force and one more sort of attack. Assuming that an interloper recognizes a solitary key of the cryptosystem, it isn't easy to unscramble the first message. This paper plans to recommend a viewpoint that is a twofold layer encryption technique to guarantee security in the cloud. This proposed twofold layer encryption will acquire the information while securing and participating in a cloud environment. This plan utilizes the incredible handling expertise of distributed computing and can proficiently guarantee cloud information protection and security. Shop around. The best Swiss iwc fake watches UK with high quality are here. Read more details if you want.
Wish you buy UK cheap rolex replica watches from the discounted website. They are suitable for both men and women.

Keywords: dual layer; data security; cloud environment

References

  1. Biswajita Datta, Akash Roy, Romit Dutta, Samir Kumar Bandyopadhyay “Secure Communication through Double Layer Security with Efficient Key Transmission” 2018 International Conference on Information Technology (ICIT) (IEEE)
  2. Dr. D.Usha, M. Subbbulakshmi “Double Layer Encryption Algorithm Key Cryptography for Secure Data Sharing in Cloud” International Journal of Scientific & Engineering Research Volume 9, Issue 5, May-2018
  3. Shivani Chauhan, Jyotsna, Janmejai Kumar, Amit Doegar “Multiple layer Text security using Variable block size Cryptography and Image Steganography” 3rd IEEE International Conference on 'Computational Intelligence and Communication Technology' (IEEE-CICT 2017)
  4. Gahan A V, Geetha D Devanagavi “An Empirical Study of Security Issues In Encryption Techniques” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 5 (2019)
  5. Ashok Kumar, Santhosha, A.Jagan “Two layer Security for data storage in cloud” 2015 1st International conference on futuristic trend in computational analysis and knowledge management (ABLAZE 2015)
  6. Naveen N, K.Thippeswamy “Security and Privacy Challenges Using Multi-Layer Encryption Approaches In Cloud Computing Environments” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8 June, 2019
  7. Afnan Ullah Khan, Manuel Oriol, Mariam Kiran, Ming Jiang, Karim Djemame “Security Risks and their Management in Cloud Computing” 2012 IEEE 4th International Conference on Cloud Computing Technology and Science
  8. F.Sabahi, “Virtualization-level security in cloud computing,” 3rd Int. 2011 IEEE Conf. Commun. Softw. Networks, pp. 250–254, 2011
  9. D. Descher, M., Masser, P., Feilhauer. and Huemer, and A. Klein “Retaining data control to the client in infrastructure clouds,” Int. Conf. Availability, Reliab. Secur. (pp. 9-16). IEEE., pp. pp. 9–16, 2009.
  10. Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.
  11. C. Modi, D. Patel, B. Borisaniya, M. Rajarajan, and A. Patel “A survey on security issues and solutions at different layers of Cloud computing,” J.Supercomputer., vol. 63, no. 2, pp. 561–592, 2013.
  12. L. Rodero-Merino, L. M. Vaquero, E. Caron, F. Desprez, and A. Muresan, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, no. 1, pp. 96–108, 2012.
  13. E. Mohamed, “Enhance data secure model for cloud computing,” Informatics Syst. (INFOS), 2012 8th Int. Conf., pp. 12–17, 2012
  14. J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics,” Build. Infrastruct. Cloud Secure., vol. 1, no. September 2011, pp. 3–22, 2014.
  15. P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
  16. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.