ENHANCED DATA SECURITY FOR PUBLIC CLOUD ENVIRONMENT WITH SECURED HYBRID ENCRYPTION AUTHENTICATION MECHANISMS

被引:1
|
作者
Prabu, S. [1 ]
Ganapathy, Gopinath [1 ]
Goyal, Ranjan [2 ]
机构
[1] Bharathidasan Univ, Sch Comp Sci Engn & Applicat, Tiruchirappalli, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
来源
关键词
Cloud Computing; Data Outsourcing; Data Security; Encryption model; Data Storage;
D O I
10.12694/scpe.v19i4.1422
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment.
引用
收藏
页码:351 / 360
页数:10
相关论文
共 50 条
  • [1] Enhanced data security for public cloud environment with secured hybrid encryption authentication mechanisms
    Prabu S.
    Ganapathy G.
    Goyal R.
    Scalable Computing, 2018, 19 (04): : 351 - 360
  • [2] Hybrid Encryption Technique to Enhance Security of Health Data in Cloud Environment
    Dutta, Aritra
    Bose, Rajesh
    Roy, Sandip
    Sutradhar, Shrabani
    ARCHIVES OF PHARMACY PRACTICE, 2023, 14 (03) : 41 - 47
  • [3] Cloud data security with hybrid symmetric encryption
    Kaushik, Shweta
    Gandhi, Charu
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [4] Enhanced Symmetric Encryption Technique for Securing Users' Data in Public Cloud Environment
    Fairosebanu, A.
    Jebaseeli, A. Nisha
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 785 - 791
  • [5] Enhanced Data Storage Security in Cloud Environment using Encryption, Compression and Splitting technique
    Rani, Kajal
    Sagar, Raj Kumar
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 366 - 370
  • [6] Data Security and Authentication in Hybrid Cloud Computing Model
    Wang, Jingxin K.
    Jia, Xinpei
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [7] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [8] Evaluation of Multifactor User Security Through Multi Authentication Verifiable Hybrid Revert Encryption for Cloud Computing Environment
    Ubada, J. Mohammed
    Surputheen, M. Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (09): : 481 - 488
  • [9] Secured Cloud Data Migration Technique by Competent Probabilistic Public Key Encryption
    M.G.Aruna
    K.G.Mohan
    中国通信, 2020, 17 (05) : 168 - 190
  • [10] Secured Cloud Data Migration Technique by Competent Probabilistic Public Key Encryption
    Aruna, M. G.
    Mohan, K. G.
    CHINA COMMUNICATIONS, 2020, 17 (05) : 168 - 190