Author:
Kumar Sanjay,Akbar Abbas Jafri Syed,Nigam NishitArun,Gupta Nakshatra,Gupta Gagan,Singh S K
Abstract
Abstract
The Cloud based Computing is a trending technology in present IT scenario in which data is stocked in a Scattered or distributed manner & resources are shared among people. The data centers are widely distributed across the globe and are accessed by anyone at any time. Data is fetched, uploaded and manipulated by several users simultaneously hence identification and authentication of users who are fetching the data need to be done mandatorily without any error. In this Research Paper we have presented a new advanced security architecture for user identification which includes two factor authentication, AES based file encryption and decryption of data uploaded on cloud, admin verification and locking of users, fetching IP details of users, distributed database storage i.e. data is stored in tiers which means user login details is stored in one database &encryption/decryption details such as (files uploaded, key) is stored on different database. Whole work deals on enhancing security for cloud computing.
Reference30 articles.
1. Security Issues in Cloud Computing A Transparent View;International Journal of Computer Science Emerging Technology,2011
2. Cloud Computing – Issues, Research and Implementations;Vouk;Journal of Computing and Information Technology CIT 16,2008
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Prediction of Level of Damage of Brain Due To Tumor Via Integrated CNN Technique;2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT);2024-02-09
2. Cyberattacks and Security of Cloud Computing: A Complete Guideline;Symmetry;2023-10-26
3. Sentiment Analysis on Amazon Alexa Reviews Using NLP & Classification;2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N);2022-12-16
4. The importance of cyber security education in digitalization and Banking;2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N);2022-12-16
5. Users’ attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China;Information & Computer Security;2022-09-27