For Queries/Clarification

alameenpublications@gmail.com

e-ISSN 2455-9288

Why publish with

ijaser

IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.

SECURITY IN CLOUD USING HYBRID CRYPTOGRAPHY

Abstract

With the rapid development of cloud services, huge volume of data is shared via cloud confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over cipher text associated with multiple owners, which makes co-owners unable to appropriately control whether data disseminators can actually disseminate their data. Distributed computing gives an adaptable and helpful route for information sharing, which brings different advantages for both society and people. Distributed computing needs to accomplish a harmony among transparency and security control to advance the development of the cloud administration business. Distributed storage security concerns the client's information security. It is important to put cryptographically improved access control on the mutual information. Cryptography based encryption is a promising crude to manufacture a pragmatic information sharing framework. The security of the delicate data should be shielding from the unapproved access for improving its security. Security is given utilizing conventional encryption and decoding process. One of the downsides of the customary calculation is that it has expanded computational intricacy, time utilization, and diminished security. We proposed a plan where the first information get scrambled into two unique qualities. Utilizing Elliptical curve cryptography (ECC) and Homomorphic Encryption(HE) are joined to give encryption. The information in each cut can be scrambled by utilizing distinctive cryptographic calculations and encryption key before putting away them in the Cloud. The goal of this system is to store information in an appropriate secure and safe way so as to maintain a strategic distance from interruptions and information assaults in the interim it will diminish the expense and time to store the scrambled information in the Cloud Storage.

Author

Mr. J. Ajay Kanna a, Ms. M. Devaki b, Dr. B. G. Geetha c
Download