For Queries/Clarification

alameenpublications@gmail.com

e-ISSN 2455-9288

Why publish with

ijaser

IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.

ENHANCING DATA SECURITY AND AUTHENTICATION IN CLOUD COMPUTING USING ADVANCED ENCRYPTION STANDARD AND DIGITAL SIGNATURE

Abstract

Abstract: Cloud computing may be a large growing technology within the IT industries. Cloud Service Providers (CSP) are measure providing numerous suitable and flexible services to the users. Users of cloud computing are growing in in an equal rhyme. As cloud computing is turning into essential a part of human life, users and CSP are measure noticing for appropriate security feathers. Several researchers are measure operating within the security aspects of cloud computing. A tendency to gift an acceptable cryptography and secure authentication system for cloud computing. This procedure includes auto encryption and KEYs dynamical process within the cloud end. New generated KEYs won't be sent to users at the start. Users are checked in 3 steps for authentication. CSP will trigger encryption method at any time manually or it will be performed automatically when logged out by the users. This procedure can guarantee additional security for data/files as well as prevent hackers from obtaining original files/data even they got valid credential. Proposed protocol is simulated by CloudSim and we observed that an additional step wants for user’s credential, it needed a bit of time to use data/files for less than the first time. This bit of time is negligible and that we will exclude it from thought however security increase more and more. Different encryption techniques attempt to overcome these data security problems to a good extent. Advanced Encryption Standard (AES) is a commonly used symmetric key encryption algorithm used for encrypting the data to be keep within the cloud. Another downside that features a distinguished role whereas handling cloud knowledge is authentication. Digital signatures are used for confirmatory the authentication of the document send by the sender for sharing with the recipients

Author

Mr. D. Seenivasan a , Ms. Seethaa Periyasamy AYP b
Download