Online Data Security for Secure Cloud Storage

N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.

Abstract

The capacity benefit given by cloud server is not completely trusted by clients. In existing system, data can be modified and corrupted by the unauthorized user with the assistance of the employees. Typically the information are safely taken care of by the organization yet a few employees offered the specifiers to programmers for cash. Because of this issue, the information are not protected. Hence the advanced safe technology is used. The information are uploaded by the encryption design with video mode and the information are downloaded by the client with the assistance of face detection video mode, at that point the administrator acknowledge the solicitation by the face recognition video mode and information are shared starting from one place to another. Utilizing the AES algorithm the information is shared safely. It is implemented in both hardware and software. It utilizes higher length key sizes, for instance, 128, 192 and 256 bits for encryption. It is most basic security convention utilized for wide range of uses, for example, wireless communication, money related exchanges, e-business, encoded information storage and so forth.

Cite

CITATION STYLE

APA

Online Data Security for Secure Cloud Storage. (2019). International Journal of Innovative Technology and Exploring Engineering, 9(1S), 99–103. https://doi.org/10.35940/ijitee.a1023.1191s19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free