Cryptography in the cloud: securing cloud data with encryption

被引:0
|
作者
Mani, A. [1 ]
Kakade, Kiran Shrimant [2 ]
Therasa, P. R. [3 ]
Vanitha, M. [4 ]
机构
[1] SA Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] Symbiosis Int Deemed Univ SIU, Symbiosis Inst Management Studies SIMS, Fac Management, Pune, India
[3] RMK Engn Coll, Dept Comp Sci & Engn, Chennai, India
[4] Saveetha Engn Coll, Dept Elect & Commun Engn, Chennai 602105, India
关键词
cryptography; public key techniques; public key encryption;
D O I
10.1504/IJESDF.2024.140744
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing utilises dispersed networks to provide computational and storage capacities. It is a kind of efficient technology that is geared specifically for the field of information technology. The use of the Internet has made both accessing data stored in the cloud and recovering that data considerably simpler and more convenient. In a cloud-based system, the storage capacity may be increased by the service providers. In a distributed system, it is generally agreed upon that security is the most important quality to possess. Cryptography is a mechanism that protects data from being seen or accessed by unauthorised parties, such as hackers or snoops. Cloud computing allows its users to store a limitless amount of data and make strategic use of a variety of resources across several dispersed systems. This work offers a privacy-preserving enabled public auditing system and less execution time is required when compared with the other existing methods.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Role based access control using identity and broadcast based encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (03) : 171 - 182
  • [42] Securing and managing healthcare data generated by intelligent blockchain systems on cloud networks through DNA cryptography
    Kaur, Harleen
    Jameel, Roshan
    Alam, M. Afshar
    Alankar, Bhavya
    Chang, Victor
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2023, 36 (04) : 861 - 878
  • [43] Encryption for Massive Data Storage in Cloud
    Ponnuramu, Veeralakshmi
    Tamilselvan, Latha
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 2, 2015, 32 : 27 - 37
  • [44] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [45] Encryption Techniques for Cloud Data Confidentiality
    Soofi, Aized Amin
    Khan, M. Irfan
    Fazal-e-Amin
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (04): : 11 - 20
  • [46] Cognitive cryptography for data security in cloud computing
    Ogiela, Urszula
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [47] Framework for Securing Data in Cloud Storage Services
    Dahshan, Mai
    Elkassass, Sherif
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 267 - 274
  • [48] Securing Cloud Data Under Key Exposure
    Karame, Ghassan O.
    Soriente, Claudio
    Lichota, Krzysztof
    Capkun, Srdjan
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 838 - 849
  • [49] Securing Public Data Storage in Cloud Environment
    Boopathy, D.
    Sundaresan, M.
    [J]. ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 555 - 562
  • [50] Securing Cloud Data using Information Dispersal
    Mar, Kheng Kok
    Hu, ZhengQing
    Law, Chee Yong
    Wang, Meifen
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,