Abstract
Virtually all companies today are existentially dependent on information and communication technology over the cloud computing. At the same time, the degree of networking between actors in business-companies, customers and government institutions-has risen steadily. This enables completely new, high-value-added applications, but at the same time poses new risks for the trouble-free functioning of a company's critical processes and the confidentiality of the stored, processed and transmitted data. In high-wage countries like India, companies are particularly forced to protect their own know-how and intellectual property well against competitors. Entrepreneurs who are concerned with knowing risks and evaluating measures to control them must therefore be able to address the challenges of effective information protection and be able to classify procedures that make an important contribution to this. The encryption of information is an effective technical procedure for this task. However, it is not an easy undertaking for a company to design an adequate overall concept for the use of encryption, since these methods can be used at very different levels of information technology and their use must be planned across processes. This scheme is intended to help overcome the obstacles to the efficient and effective use of encryption in the company using new enhanced hashing algorithm. It is designed to inform companies about how encryption helps to protect the confidentiality of information when using modern information and communication technology. It shows in which areas of application and against which attacks encryption is useful and how the various encryption methods can be meaningfully combined. This scheme is manufactured for managing directors, department heads and other decision-makers who want to familiarize themselves with the use of encryption technology in order to plan steps for designing an encryption architecture that makes sense for their company. Small and medium-sized companies in particular are in the spotlight, since they too are the focus of industrial espionage and they also have a higher risk that the loss of confidentiality of sensitive information will jeopardize their existence. We hereby introduce the new approach in the paradigm of cryptology (Role Based Security and Hashing Technique) in cloud computing for CRM solution with the name of H#ABE.
Cite
CITATION STYLE
Kumar, P. (2020). Two Fold Security on Cloud CRM using Hash Encryption and Role Based Security. International Journal of Advanced Trends in Computer Science and Engineering, 9(4), 4341–4351. https://doi.org/10.30534/ijatcse/2020/25942020
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.