System for Security in Cloud Computing Environment

##plugins.themes.bootstrap3.article.main##

##plugins.themes.bootstrap3.article.sidebar##

Published Aug 4, 2017
Thota Vishnu Priya Dr. M.N Faruk

Abstract

Cloud computing enables the users to access the outsourced data from the cloud server without the hardware and software management. Data stored on a cloud service-provider’s equipment must be encrypted for data security. Encrypting data prior to storage is a common method of data protection, and service providers will be able to build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to third party. However, if the decryption key and the encrypted data are held by the same service provider, it raises vulnerability in data security, thus presenting a risk for the unauthorized disclosure of the user data. This paper provides an unique approach/model of cryptography where crypto keys are distributed across the user and service provider with adoption of such a model mainly the CSP insider attack an form of misuse of valuable user data can be treated secured. Thus, the proposed method not only encrypts the sensitive data, but also detects the dishonest party to access the data using combined hash functions.

How to Cite

System for Security in Cloud Computing Environment. (2017). Asian Journal of Current Engineering and Maths, 6(4), 39-44. https://doi.org/10.15520/ajcem.2017.vol6.iss4.80.pp39-44.
Abstract 326 |

##plugins.themes.bootstrap3.article.details##

Section
Mathematics

How to Cite

System for Security in Cloud Computing Environment. (2017). Asian Journal of Current Engineering and Maths, 6(4), 39-44. https://doi.org/10.15520/ajcem.2017.vol6.iss4.80.pp39-44.