What are you looking for ?
Advertise with us
RAIDON

R&D: Cloud Computing Using OWASP, Open Web Application Security Project

Demonstrated that produced key sets have variety of useful characteristics that defend privacy of protection of communication channels from fraud attacks by other nodes in network.

IEEE Xplore has published, in 2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS) proceedings, an article written by Gangineni Jahanavi, Tasmiya Mubeen, R. Aishwarya, and R Yogitha,Department of CSE, Sathyabama Institute of Science and Technology.

Abstract: Sharing data while ensuring its security is a difficult task nowadays. Users submit files in a data sharing system that have been encrypted using an encryption key. Any system for large-scale data exchange has to have this quality in light of a user leaks crucial information, it won’t be feasible for the system to maintain the information to be protected. For data owners, distributing their information via servers presents many difficulties. There are several approaches to fix these problems. These methods are crucial for managing keys shared by the data owner. In this study dependable source is used for user authentication of cloud data access. The key is first generated by the trusted authority using the SHA algorithm, and it is then sent to both the owner and the user. Second, the trusted authority module creates a sequence number using the MD-5 algorithm method after receiving an AES -encrypted file from the data owner. It stores a key in its database that is necessary for changing operations and for system identification. (CSP or Owner). a file was sent to the CSP module by this trusted authority for cloud storage. It is demonstrated that the produced key sets have a variety of useful characteristics that defend the privacy of the protection of communication channels from fraud attacks by the other nodes in the network.“

Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E