Enforcing Confidentiality and Authentication over Public Cloud Using Hybrid Cryptosystems

13Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud Computing is that the on-demand delivery of computing power, data storage, applications, and different IT resources through a cloud services platform via Infobahn. The sleek the progress of consumer in easiness, speed, capability, etc., to the work areas from finish to finish their examination. The huge amount of knowledge is handled by the data center provided by cloud. In Cloud computing, the protection choices still stay a massive disadvantage throughout its development. Specializing in security issues, this learning meant toward coming up with some spick-and-span security methodology victimization hybrid cryptosystems. The requirement for this examination is to safeguard data from non-permitted right to use or hackers in cloud at the time of knowledge communication by encrypting the user data. This hybrid cryptosystem is meant and includes of every interchangeable and uneven cryptography rule throughout that blowfish isobilateral rule deals with data confidentiality whereas, RSA uneven rule deals that come with nursing authority. This technique in addition includes the Secured Hash rule-3 for data integrity. This planned methodology provides high security throughout data transmission over the net and licensed network access, server, and storage application.

Cite

CITATION STYLE

APA

Thillaiarasu, N., Chenthur Pandian, S., Naveen Balaji, G., Benitha Shierly, R. M., Divya, A., & Divya Prabha, G. (2019). Enforcing Confidentiality and Authentication over Public Cloud Using Hybrid Cryptosystems. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 26, pp. 1495–1503). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-03146-6_175

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free