Compositional Defence of Application Privacy in Resistant to Physical and Software Attacks in Untrusted Cloud Environment

Author:

Chanodiya* Mitesh, ,Potey Dr. Manish,

Abstract

Cloud computing facilities have become an increasing rise in demand for presenting computing sources. Various programs like monetary transactions, fitness care systems, video streaming, IoT programs want on-call for provisioning of cloud sources to guarantee timeliness and excessive availability. A shared culture for data interchange has evolved as a result of the fast progress of networking technology. The data security has become a difficult issue as a result of the vast volume of data that is exchanged via the internet. Thus there is a requirement for security to protect data that is transmitted across an insecure connection. In our proposed work, privacy, confidentiality, availability, integrity, and accountability that contribute to the security of information are ensured by cryptographic technique. This paper also describes an exhaustive study on the usage of hybrid algorithms i.e. the combination of Advanced Encryption Standards (AES) and Elliptical Curve Cryptography (ECC) to protect data leakage and protect the privacy of end-users and SHA256 algorithm to ensure data integrity. This type of hybrid encryption will help not only in concentrating software as well as physical attacks but also provide the model to deal with and prevent the application from these types of attacks; thus making the cloud application system more secure. The implemented web application can be used as a defence system for privacy and security in organizations as well as institutions where members of the organization can share the file or confidential data to other team members or colleagues without data leakage thus providing data privacy and security.

Publisher

Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP

Subject

Computer Science Applications,General Engineering,Environmental Engineering

Reference18 articles.

1. Lei Xu, JongHyuk Lee, Seung Hun Kim, Qingji Zheng, Shouhuai Xu, Taeweon Suh, Won Woo Ro,and Weidong Shi, "Architectural Protection of Application Privacy Against Software and Physical Attacks in Untrusted Cloud Environment", IEEE transaction paper on cloud computing, March 2018.

2. Pan Jun Sun, "Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions", IEEE Journal of Information Security Special Project, Development and Reform Office, publication-October 9, 2019, current version-October 23, 2019.

3. Wei Wu, Jianying Zhou, Yang Xiangc, Li Xua, "How to achieve non-repudiation of origin with privacy protection in cloud computing", Elsevier Journal of Computer and System Sciences 79 (2013) 1200-1718, China, 2018.

4. Pan Jun Sun, "Security and privacy protection in cloud computing: Discussions and challenges", Elsevier Journal of Network and Computer Applications, 160 (2020) 102642, China, 2020.

5. Jun Feng, Laurence T. Yang, Fellow, Ronghao Zhang, Weizhong Qiang, and Jinjun Chen, "Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications", IEEE Journal of Industrial Informatics, 2998086, University of Wollgong, China, 2018.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3