What are you looking for ?
Infinidat
Articles_top

R&D: Integrating Encryption Techniques for Secure Storage in Cloud

Projected proposal is vastly proficient and satisfies security prerequisites of secure data sharing and can efficiently withstand security attacks.

Transactions on Emerging Telecommunications Technologies has published an article written by Bijeta Seth, Surjeet Dalal, Department of Computer Science & Engineering, SRM University, Sonipat, India, Vivek Jaglan, Department of Computer Science & Engineering, Graphic Era Hill University, Dehradun, India, Dac-Nhuong Le, Institute of Research and Development, Duy Tan University, Danang, Vietnam, and Faculty of Information Technology, Duy Tan University, Danang, Vietnam, Senthilkumar Mohan, School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India, Gautam Srivastava, Department of Mathematics and Computer Science, Brandon University, Brandon, Manitoba, Canada, Research Center for Interneural Computing, China Medical University, Taichung, Taiwan, and College of Information and Electrical Engineering, Asia University, Taichung, Taiwan.

Abstract: Cloud computing has emerged as one of the most groundbreaking technologies to have redefined the bounds of conventional computing techniques. It has ushered in a paradigm shift and pushed the frontiers of how computing assets, inclusive of infrastructure resources, software, and applications can be used, adopted, and purchased. The economic benefits or rather the fundamental economic shift offered by cloud computing in reducing capital expenditure and converting it to operational expenditure has been a primary motivating factor for early adopters. However, despite its inherent advantages that include better access and control, there exist several reservations around cloud computing that have impeded its growth. The control, elasticity, and ease of use that cloud computing is associated with also engender many security issues. Security is considered to be the topmost hurdle out of the nine identified challenges of cloud computing as underlined by the study conducted by the International Data Corporation. It therefore follows that an exceedingly secure system is essential for the safeguarding of an organizational entity, its resources, and assets. In this article, it is our endeavor to offer insights into the implementation of a novel architecture that can deliver an enhanced degree of security for outsourcing information in a cloud computing environment while involving numerous independent cloud providers. The framework comprises of dual encryption and data fragmentation techniques that envision the secure distribution of information in a multicloud environment. The various concerns surrounding this area, specifically, the challenges of integrity, security, confidentiality, and authentication have been addressed. All simulations and scrutiny have been accomplished on an Oracle virtual machine Virtual‐Box and a Fog environment on an Ubuntu 16.04 platform. Extensive safety measures and performance analysis that take into account diverse parameters, especially execution time, integrity, throughput, entropy, transfer rate, and delay demonstrate that our projected proposal is vastly proficient and satisfies the security prerequisites of secure data sharing and can efficiently withstand security attacks.

Articles_bottom
AIC
ATTO
OPEN-E