A cross encryption scheme for data security storage in cloud computing environment

被引:0
|
作者
Kang, Haiyan [1 ]
Deng, Jie [2 ]
机构
[1] Beijing Informat Sci & Technol Univ, Sch Informat Management, Beijing 100192, Peoples R China
[2] Beijing Informat Sci & Technol Univ, Comp Sch, Beijing 100192, Peoples R China
关键词
cloud computing; data encryption; DES; RSA; cross encryption;
D O I
10.1504/IJIPT.2023.129745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is one of the popular technologies in the development of information technology. Cloud computing not only provides users with high-performance computing, but also meets the needs of large-scale data storage. However, because the storage service provided by cloud computing is completely transparent to users, users cannot understand whether their data is safe in the cloud computing environment. The resulting distrust has brought great obstacles to the development of cloud computing. Therefore, this paper first describes the basic knowledge and system architecture of cloud storage, and analyses the development status of cloud storage. Secondly, in order to ensure the storage security of user data in the cloud computing environment, this paper studies the data encryption algorithm, and proposes a cross encryption scheme of data security storage in the cloud computing environment. Finally, the scheme is compared with the traditional hybrid encryption method. The experimental results show that the scheme has the advantages of good encryption and decryption effect, fast execution speed and high security. It is an ideal scheme for data security storage in cloud computing environment.
引用
收藏
页码:1 / 10
页数:11
相关论文
共 50 条
  • [1] A data encryption scheme for cloud storage security
    Wu, Wei-nong
    Zheng, Yuan-bing
    Wu, Bin
    Wu, Lie
    [J]. WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 666 - 674
  • [2] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [3] Searchable Encryption Scheme for Large Data Sets in Cloud Storage Environment
    Xiong, Yi
    Luo, Ming Xing
    [J]. RADIOENGINEERING, 2024, 33 (02) : 223 - 235
  • [4] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    [J]. 2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [5] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4573 - 4585
  • [6] Study on Mobile Large Data Storage Security in Cloud Computing Environment
    Li, Xianwei
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 77 - 81
  • [7] Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing
    Dogan, Demet Cidem
    Altindis, Huseyin
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2020, 26 (01) : 78 - 83
  • [8] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    [J]. TECHNOLOGIES, 2019, 7 (01):
  • [9] A Cloud Storage Encryption Scheme in the Limited Bandwidth Environment
    Cheng, Wen-juan
    Zhou, Miao-miao
    Tong, Bing
    Tang, Shi-xiang
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 287 - 292
  • [10] Ensuring Data Storage Security in Cloud. Computing Based on Hybrid Encryption Schemes
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    [J]. 2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 320 - 325