Submit your papers Submit Now
International Peer-Reviewed Journal
For Enquiries: editor@iiardjournals.org
đź“„ Download Paper

Applying Encryption and Decryption Algorithm for Data Security in Cloud

Fatima Ghaiyur Haya, Mithun B.N.

Abstract

Data security refers to the method involved with safeguarding information from unapproved access and information corruption all through its lifecycle. Data security includes information encryption, hashing, tokenization, and key administration practices that protect information across all applications and stages. Cloud framework for getting to information with mysterious confirmation gives safer client verification, client revocation and prevents replay attacks. Access control is handled on cloud KDCs it is overall safer aimed at information encryption. Produced decentralized KDC's are then gathered by (KGC). Framework gives confirmation to the client, in which just framework approved clients can unscramble, view the put away data. Client approvals and access control plot is presented in cloud, which is important for hindering replay attacks and supports change of data set aside in the cloud. The entry control plot is procuring thought since just upheld clients should approach genuine examine. Our arrangement thwarts maintains creation, replay attacks, scrutinizing and adjust data set aside in the cloud. We in like manner address client disavowal. The issues of endorsement, access control, security affirmation should be handled simultaneously

Keywords

Decentralized KDCs Access control Cloud ECC Encryption Decryption

References

[1]Shukla, D.K.; Dwivedi, V.K.; Trivedi, M.C. Encryption algorithm in cloud computing. Mater.
Today Proc. 2020, 37, 1869–1875.

[2]https://cryptobook.nakov.com/asymmetric-key-ciphers/ecc-encryption-decryption

[3]https://www.cloudflare.com/en- in/learning/ssl/what- is-encryption/

[4] Bhardwaj, K.; Chaudhary, S. Implementation of elliptic curve cryptography in „C?. Int. J.
Emerg. Technol. 2012, 3, 38–51.

[5]Ogiela, U. Cognitive cryptography for data security in cloud computing. Concurr. Comput.
Pr. Exp. 2019, 32, e5557.

[6]Sood, S.K. A combined approach to ensure data security in cloud computing. J. Netw.
Comput. Appl. 2012, 35, 1831–1838. [Google Scholar]

[7 ] Mendonca, S.N. Data security in cloud using AES. Int.J.Eng. Res. Technol. 2018, 7.

[8] Suresha, R.G. Enhancing security in cloud storage using ecc algorithm. Int. J. Sci. Res. 2013,
2–8. Available online: https://www.ijsr.net/archive/v2i7/MDIwMTM3NA==.pdf (accessed on 22
October 2021).

[9] Abbas, S.; Maryoosh, A.A. Improving data storage security in cloud computing using elliptic
curve cryptography. IOSR J. Comput. Eng. 2015, 17, 48–53.

[10]SamikshaSharma,VinayChopra“ANALYSIS OF AES ENCRYPTION WITH ECC”

[11]”Enhanced Cloud Storage Security Using ECC-AES A Hybrid Approach”

[12] Borse Manoj V. Bhandure Harshad D. Patil Dhiraj M. Bhad Pratik B “Location Based
Encryption-Decryption Approach for Data Security”

[13] Obaida Mohammad Awad Al-Hazaimeh” A NEW APPROACH FOR COMPLEX
ENCRYPTING AND DECRYPTING DATA”

[14] SHASHANK, S.K. Saravanan, G. Rekha” Information Security in Big Data using
Encryption and Decryption”