Details

Leveraging the Dual Layer in Enhancing the Data Security Safeguards in Cloud Environment

Anoushka Gupta

Step by Step, Noida

36-42

Vol: 11, Issue: 2, 2021

Receiving Date: 2021-05-10 Acceptance Date:

2021-06-04

Publication Date:

2021-06-25

Download PDF

http://doi.org/10.37648/ijrst.v11i02.004

Abstract

One of the significant benefits of distributed computing is dividing information between different organizations. Notwithstanding, this benefit itself has a danger to information. It is important to ensure communication to refute likely risks to the data. Encryption is a tremendously powerful instrument concerning securing information. This paper proposes another span of cryptographic double-layer encryption to make the information put away in the cloud safer and dependable. There are promptly accessible numerous different encryption methods accessible at present; however incapable of giving adequate security. This paper intends to propose a new encryption strategy named double encryption. It depends on the well-known encryption analysis, ais a symmetric-key study. We will offer an extra layer of rabbit calculation around encoded information, which will assist with giving greater protection from Brute force and one more sort of attack. Assuming that an interloper recognizes a solitary key of the cryptosystem, it isn't easy to unscramble the first message. This paper plans to recommend a viewpoint that is a twofold layer encryption technique to guarantee security in the cloud. This proposed twofold layer encryption will acquire the information while securing and participating in a cloud environment. This plan utilizes the incredible handling expertise of distributed computing and can proficiently guarantee cloud information protection and security. Shop around. The best Swiss iwc fake watches UK with high quality are here. Read more details if you want.
Wish you buy UK cheap rolex replica watches from the discounted website. They are suitable for both men and women.

Keywords: dual layer; data security; cloud environment

References

  1. Biswajita Datta, Akash Roy, Romit Dutta, Samir Kumar Bandyopadhyay “Secure Communication through Double Layer Security with Efficient Key Transmission” 2018 International Conference on Information Technology (ICIT) (IEEE)
  2. Dr. D.Usha, M. Subbbulakshmi “Double Layer Encryption Algorithm Key Cryptography for Secure Data Sharing in Cloud” International Journal of Scientific & Engineering Research Volume 9, Issue 5, May-2018
  3. Shivani Chauhan, Jyotsna, Janmejai Kumar, Amit Doegar “Multiple layer Text security using Variable block size Cryptography and Image Steganography” 3rd IEEE International Conference on 'Computational Intelligence and Communication Technology' (IEEE-CICT 2017)
  4. Gahan A V, Geetha D Devanagavi “An Empirical Study of Security Issues In Encryption Techniques” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 5 (2019)
  5. Ashok Kumar, Santhosha, A.Jagan “Two layer Security for data storage in cloud” 2015 1st International conference on futuristic trend in computational analysis and knowledge management (ABLAZE 2015)
  6. Naveen N, K.Thippeswamy “Security and Privacy Challenges Using Multi-Layer Encryption Approaches In Cloud Computing Environments” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8 June, 2019
  7. Afnan Ullah Khan, Manuel Oriol, Mariam Kiran, Ming Jiang, Karim Djemame “Security Risks and their Management in Cloud Computing” 2012 IEEE 4th International Conference on Cloud Computing Technology and Science
  8. F.Sabahi, “Virtualization-level security in cloud computing,” 3rd Int. 2011 IEEE Conf. Commun. Softw. Networks, pp. 250–254, 2011
  9. D. Descher, M., Masser, P., Feilhauer. and Huemer, and A. Klein “Retaining data control to the client in infrastructure clouds,” Int. Conf. Availability, Reliab. Secur. (pp. 9-16). IEEE., pp. pp. 9–16, 2009.
  10. Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.
  11. C. Modi, D. Patel, B. Borisaniya, M. Rajarajan, and A. Patel “A survey on security issues and solutions at different layers of Cloud computing,” J.Supercomputer., vol. 63, no. 2, pp. 561–592, 2013.
  12. L. Rodero-Merino, L. M. Vaquero, E. Caron, F. Desprez, and A. Muresan, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, no. 1, pp. 96–108, 2012.
  13. E. Mohamed, “Enhance data secure model for cloud computing,” Informatics Syst. (INFOS), 2012 8th Int. Conf., pp. 12–17, 2012
  14. J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics,” Build. Infrastruct. Cloud Secure., vol. 1, no. September 2011, pp. 3–22, 2014.
  15. P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
  16. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

situs alexistogel

alexistogel

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

bandar alexistogel

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel slot

alexistogel

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

slot online dana

situs slot online

alexistogel

bandar togel online

slot online terpercaya

togel slot online

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

alexistogel terpercaya

rtp slot gacor

slot online gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

game slot online

togel online terpercaya

daftar togel slot online

bandar togel terpercaya

slot online gacor

trik slot bonus

prediksi togel online

rtp slot online

panduan togel online

prediksi togel

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 rtp

bandarbola855 link

bandarbola855 bandar

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

iosbet

iosbet

iosbet

iosbet

liatogel

login liatogel

liatogel totomacau