Implementation for securing the cloud data and providing secured access across the network

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Storing and retrieving data in cloud are important in today’s environment. It also adds insecurity as data sharing in cloud would be affected by hacking or modifying the original content of the data. For secure data transmission, encryption and decryption are the most followed methods. This existing method demands the authentication, security keys from a third party cannot be considered safe because the entire network becomes questionable when such party is not trustworthy. This paper proposes a method, where encrypting the public keys and decrypting the private keys would be generated from cloud node itself, not by a separate trusted authority. This paper also uses the attribute real-time parameters taken for building security keys for each requesting nodes in time dependent manner. Since attributes are real-time parameters and changes on random deployment add to security to the contributing nodes. Furthermore, some parameters like busy state help to route data and ensure good packet delivery and client data storage.

Cite

CITATION STYLE

APA

Sheshasaayee, A., & Geetha, K. (2017). Implementation for securing the cloud data and providing secured access across the network. In Advances in Intelligent Systems and Computing (Vol. 468, pp. 783–790). Springer Verlag. https://doi.org/10.1007/978-981-10-1675-2_77

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free