Eine Plattform für die Wissenschaft: Bauingenieurwesen, Architektur und Urbanistik
Improved End-to-End Data Security Approach for Cloud Computing
Cloud computing is one of the major cutting-edge technologies that is growing at a gigantic rate to redefine computation through service-oriented computing. It has addressed the issue of owning and managing computational infrastructure by providing service through a pay-and-use model. However, a major possible hindrance is security breaches, especially when the sender uploads or the receiver downloads the data from a remotely accessed server. It is a very generic approach to ensuring data security through different encryption techniques, but it might not be able to maintain the security standard. This paper proposes an end-to-end data security approach from the sender side to the receiver side by adding extra padding sequences, as well as randomized salting, followed by hashing and an encryption technique. The effectiveness of the proposed method was established using both a simulated system and mathematical formulations with different performance metrics. Furthermore, its performance was compared with those of contemporary algorithms, showing that the proposed algorithm creates a larger ciphertext that is almost impossible to crack due to randomization modules. However, it has significantly longer encryption and decryption times, although our primary concern is ensuring security, not reducing time.
Improved End-to-End Data Security Approach for Cloud Computing
Cloud computing is one of the major cutting-edge technologies that is growing at a gigantic rate to redefine computation through service-oriented computing. It has addressed the issue of owning and managing computational infrastructure by providing service through a pay-and-use model. However, a major possible hindrance is security breaches, especially when the sender uploads or the receiver downloads the data from a remotely accessed server. It is a very generic approach to ensuring data security through different encryption techniques, but it might not be able to maintain the security standard. This paper proposes an end-to-end data security approach from the sender side to the receiver side by adding extra padding sequences, as well as randomized salting, followed by hashing and an encryption technique. The effectiveness of the proposed method was established using both a simulated system and mathematical formulations with different performance metrics. Furthermore, its performance was compared with those of contemporary algorithms, showing that the proposed algorithm creates a larger ciphertext that is almost impossible to crack due to randomization modules. However, it has significantly longer encryption and decryption times, although our primary concern is ensuring security, not reducing time.
Improved End-to-End Data Security Approach for Cloud Computing
Soumalya Ghosh (Autor:in) / Shiv Kumar Verma (Autor:in) / Uttam Ghosh (Autor:in) / Mohammed Al-Numay (Autor:in)
2023
Aufsatz (Zeitschrift)
Elektronische Ressource
Unbekannt
Metadata by DOAJ is licensed under CC BY-SA 1.0
Cloud computing data security protection system in big data network environment
Europäisches Patentamt | 2021
|A Unified Approach Toward Security Audit and Compliance in Cloud Computing
Springer Verlag | 2024
|A Unified Approach Toward Security Audit and Compliance in Cloud Computing
Springer Verlag | 2024
|Fuzzy Modeling for Information Security Management Issues in Cloud Computing
British Library Online Contents | 2014
|Cloud Computing Information System Security Monitoring Under Artificial Intelligence Technology
Springer Verlag | 2023
|