Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2065
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kulshrestha, Vartika | - |
dc.contributor.author | Verma, Seema | - |
dc.contributor.author | Rama Krishna, C | - |
dc.date.accessioned | 2023-11-20T12:48:21Z | - |
dc.date.available | 2023-11-20T12:48:21Z | - |
dc.date.issued | 2022-02-17 | - |
dc.identifier.citation | Vol. 21, No. 1-2; pp. 158-173 | en_US |
dc.identifier.issn | 1755-0386 | - |
dc.identifier.issn | 1755-0394 | - |
dc.identifier.uri | https://doi.org/10.1504/IJAIP.2022.121035 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2065 | - |
dc.description.abstract | Cloud computing (CC) is a popular paradigm with dynamic capabilities where statistics are maintained, managed, and backed up remotely. It allows consumers as well as corporations over a web network to use the services as per demand and requirement and increases the competences of the hardware resources by optimal and shared utilisation. However, information security and privacy have become a crucial issue that affects the triumph of CC. First and foremost, information storage at cloud builds the risk of information leak and illegal access. Second, cloud servers are turning into the objectives of assaults and interruptions which challenge cloud security. Third, information management tasks, like, information storage, reinforcement, migration, removal, update, exploration, query and admittance in the cloud may not be completely trusted by its proprietors. Therefore, to enhance security, a hybrid security technique for CC using a probabilistic approach has been proposed. The proposed framework facilitates the cloud consumer with information security reassurance. Our elucidation is built on 'hybrid probabilistic triple (RSA and AES) encryption' approach and this methodology is used to encode-decode the information before porting on a cloud with a hash value of each and delivers the data integrity, confidentiality and user authenticity, along with, a review of different privacy and security issues is also discussed. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Advanced Intelligence Paradigms | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Security | en_US |
dc.subject | RSA | en_US |
dc.subject | AES | en_US |
dc.subject | Authenticity | en_US |
dc.title | Hybrid Probabilistic Triple Encryption Approach for Data Security in Cloud Computing | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
kulshrestha-et-al-2022-hybrid-probabilistic-triple-encryption-approach-for-data-security-in-cloud-computing.pdf Restricted Access | 986.32 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.