A Novel Symmetric Key Cryptography Algorithm for Improving Privacy of Data in Cloud Servers
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
In this paper, a cryptography technique, Novel Symmetric Key Cryptography algorithm is used to improve the data security and access control in the environment of Cloud Computing. The users upload the personal data over the cloud. Security is mandatory for such type of outsourced data, so that users are confident while processing their private and confidential data. Modern technology suffers from computational problem of keys and there exchange. This paper emphasizes the different problems and issues that arise while using cloud services such as key generation, data security and authentication. The paper addresses these problems using access control technique which ensures that only the valid users can access their data. It proposes a RSA Key Exchange Protocol between cloud service provider and the user for secretly sharing a symmetric key for the secure data access that solves the problem of key distribution and management. The data security will be done using the proposed Novel Symmetric Key Cryptography (N-SKC) algorithm with the help of generated key. The proposed work done using Cloud is highly efficient and secure in the existing security models.
Authors and Affiliations
K Padmanaban, S Janani, R Panneer Selvi
A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT
Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...
Proposed mobility hub at Trivandrum
Based on the goal of reducing the usage of private vehicles thus reducing the vehicular trips, congestion, pollution etc. we proposed a Mobility Hub, is a principal focal point that links all public transportation servi...
Exemplary Instinctive Repression Of Worms
Key diligence is the routing procedure that absolute the packet in the network routing sachets fully associated to wireless set of connections has considered to a great coverage but the assumption on packed connectiv...
Joint Estimation of CFO and Channel Estimation for Rayleigh Fading Channel with Kalman Filter for OFDM System
Due to its high data rate transmission capability with high bandwidth efficiency and its robustness to multipath delay, the Orthogonal Frequency Division Multiplexing (OFDM) has recently been applied widely in wireles...
An Improved Performance of MANET using AODV Protocol for Black Hole Detection
Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been propo...