GLEnc Algorithm to Secure Data in Public Cloud Environment

被引:0
|
作者
George, Lalu P. [1 ]
Amalarethinam, D. I. George
Chandran, Anjana S. [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli 620020, India
[2] SCMS Sch Technol & Management, Cochin 683501, Kerala, India
关键词
Cloud computing; Cloud security; Public cloud; Data protection in public cloud; Data Protection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, technology has evolved throughout the years. Data storage has become transparent after the commencement of the internet. The emergence of cloud computing allows data stored at different locations with different servers using internet and central remote servers. The advantage of cloud computing has transformed the method distributed computing used in the past. Data security is totally maintained by means of encryption. Encryption and decryption are the key elements where hidden data is transformed into an undecipherable code, while decryption is the exact opposite resulting in the original data. The proposed algorithm is performed prior to the arrival of data in the cloud storage. Here the real plain text undergoes different types of splitting and dividing techniques. Three keys are employed at different stages to get highly encrypted data. This paper presents to protect data in the Public Cloud Environment.
引用
下载
收藏
页码:2018 / 2022
页数:5
相关论文
共 50 条
  • [21] Privacy Preservation of a Group and Secure Data Storage in Cloud Environment
    Govinda, K.
    Sathiyamoorthy, E.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (01) : 46 - 54
  • [22] Secure Query Processing with Data Interoperability in a Cloud Database Environment
    Wong, Wai Kit
    Kao, Ben
    Cheung, David Wai Lok
    Li, Rongbin
    Yiu, Siu Ming
    SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1395 - 1406
  • [23] A Secure Medical Data Exchange Protocol Based on Cloud Environment
    Chen, Chin-Ling
    Yang, Tsai-Tung
    Shih, Tzay-Farn
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)
  • [24] A survey of public auditing for secure data storage in cloud computing
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [25] Public Data Integrity Verification Scheme for Secure Cloud Storage
    Ping, Yuan
    Zhan, Yu
    Lu, Ke
    Wang, Baocang
    INFORMATION, 2020, 11 (09)
  • [26] Public data integrity verification scheme for secure cloud storage
    Ping Y.
    Zhan Y.
    Lu K.
    Wang B.
    Ping, Yuan (pyuan.lhn@xcu.edu.cn); Wang, Baocang (bcwang79@aliyun.com), 1600, MDPI AG (11):
  • [27] Secure approach to sharing digitized medical data in a cloud environment
    Pradeep Kumar K.
    Prathap B.R.
    Thiruthuvanathan M.M.
    Murthy H.
    Jha Pillai V.
    Data Science and Management, 2024, 7 (02): : 108 - 118
  • [28] Modelling a secure framework for data verification and integrity in cloud environment
    Nagesh, Puvvada
    Srinivasu, N.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [29] Enhanced Public Auditability & Secure Data Storage in Cloud Computing
    Chakraborty, Tamal Kanti
    Dhami, Anil
    Bansal, Prakhar
    Singh, Tripti
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 101 - 105
  • [30] Secure Sharing of Mobile Device Data using Public Cloud
    Alam, Md Mozammil
    Hati, Sourav
    De, Debashis
    Chattopadhyay, Samiran
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 149 - 154