Enhancement of data confidentiality and secure data transaction in cloud storage environment

被引:3
作者
Neela, K. L. [1 ]
Kavitha, V. [2 ]
机构
[1] Univ Coll Engn, Dept Comp Sci & Engn, Kanyakumari 629004, Tamil Nadu, India
[2] Univ Coll Engn, Dept Comp Sci & Engn, Kanchipuram 631552, Tamil Nadu, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2018年 / 21卷 / 01期
关键词
Cyclic shift transposition algorithm; Quick response; Hash based timestamp; Cloud computing; Security and privacy; One time password;
D O I
10.1007/s10586-017-0959-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a growing trend in many leading sectors. The task that challenges almost every progressing implementation is security and privacy. In earlier days, corporate/IT sectorswere facing more security challenges over the data. Especially in a centralized environment, unauthorized users can easily modify the data without the knowledge of the owner, i.e., security breach is unavoidable. So, it becomes mandatory to secure the data. The proposed model follows the decentralized architecture which does not depend on any third party system. In this model, the data security can be enhanced by using cyclic shift transposition algorithm. For a secure data transmission and retrieval, we use quick response code and hash-based timestamp so that the real-time attacks are stopped or prevented.
引用
收藏
页码:115 / 124
页数:10
相关论文
共 21 条
[1]  
Alam Hossain Md, 2016, INT J ADV RES COMPUT, V6, P659
[2]  
[Anonymous], 2011, QR CODE ESSENTIALS
[3]  
[Anonymous], 2016, GUARD TIME
[4]   A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid [J].
Baek, Joonsang ;
Quang Hieu Vu ;
Liu, Joseph K. ;
Huang, Xinyi ;
Xiang, Yang .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) :233-244
[5]   Audit-Free Cloud Storage via Deniable Attribute-Based Encryption [J].
Chi, Po-Wen ;
Lei, Chin-Laung .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) :414-427
[6]  
Divya R., 2015, IEEE 9 INT C INT SYS
[7]  
Gandhi V. A., INT J ADV NETW APPL, P117
[8]  
Gomathi S., 2014, J THEOR APPL INF TEC, V63
[9]  
Haber S., 1990, Journal of Cryptology, V3, P99, DOI DOI 10.1007/BF00196791
[10]  
Jasim O. K., 2013, INT J EMERG TRENDS T, V2