2015
DOI: 10.24297/ijct.v14i12.1776
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach of Hybrid Model of Encryption Algorithms and Fragmentation to Ensure Cloud Security

Abstract: Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Our paper is an attempt to advance the version of this paper [2] Amanjot and Manisha have proposed an approach that uses RSA, Triple DES and Random Number generator algorithms, their approach does provide security but at the cost of heavy overhead in cases of large amount of data. We attempt to overcome this issue by using a single key but by breaking it for a group of large number of users [3] AES, RSA and DES comparisons does not confirm any of them as the best in all algorithms instead they all have different advantages and disadvantages. AES consumes less memory whereas DES takes less time and RSA will result in less output bytes.…”
Section: Related Previous Workmentioning
confidence: 99%
“…Our paper is an attempt to advance the version of this paper [2] Amanjot and Manisha have proposed an approach that uses RSA, Triple DES and Random Number generator algorithms, their approach does provide security but at the cost of heavy overhead in cases of large amount of data. We attempt to overcome this issue by using a single key but by breaking it for a group of large number of users [3] AES, RSA and DES comparisons does not confirm any of them as the best in all algorithms instead they all have different advantages and disadvantages. AES consumes less memory whereas DES takes less time and RSA will result in less output bytes.…”
Section: Related Previous Workmentioning
confidence: 99%
“…Ultimately, practical uses for completely homomorphic encryption are still a ways off [22]. To ensure the security of user data in cloud computing, a number of encryption methods have been proposed, including Diffie-Hellman [23] and a hybrid system that combines RSA, 3DES, and random number generator [24].…”
Section: • Homomorphic Encryptionmentioning
confidence: 99%
“…The security level in this mechanism depends on the tables and features in the databases that reduce the rules of inference and prevents the user from viewing the entire database. Kaur and Bhardwaj [7] proposed technique to improve the security in a cloud computing environment that increases the flexibility of security levels using encryption algorithms which are RSA, Random Number Generator and DES. BabuRaj and Babu [8] introduced a Schema that works to manipulate the database through the use of user levels and use of the master key to protect private key and private information.…”
Section: Al-rafidain Journal Of Computer Sciences and Mathematics (Rjcm)mentioning
confidence: 99%