International Journal of Engineering and Modern Technology (IJEMT )
E-ISSN 2504-8848
P-ISSN 2695-2149
VOL. 8 NO. 2 2022
DOI: https://www.doi.org/10.56201/ijemt.v8.no2.2022.pg16.23
Fatima Ghaiyur Haya, Mithun B.N.
Data security refers to the method involved with safeguarding information from unapproved access and information corruption all through its lifecycle. Data security includes information encryption, hashing, tokenization, and key administration practices that protect information across all applications and stages. Cloud framework for getting to information with mysterious confirmation gives safer client verification, client revocation and prevents replay attacks. Access control is handled on cloud KDCs it is overall safer aimed at information encryption. Produced decentralized KDC's are then gathered by (KGC). Framework gives confirmation to the client, in which just framework approved clients can unscramble, view the put away data. Client approvals and access control plot is presented in cloud, which is important for hindering replay attacks and supports change of data set aside in the cloud. The entry control plot is procuring thought since just upheld clients should approach genuine examine. Our arrangement thwarts maintains creation, replay attacks, scrutinizing and adjust data set aside in the cloud. We in like manner address client disavowal. The issues of endorsement, access control, security affirmation should be handled simultaneously
Decentralized KDCs, Access control, Cloud, ECC, Encryption, Decryption
[1]Shukla, D.K.; Dwivedi, V.K.; Trivedi, M.C. Encryption algorithm in cloud computing. Mater.
Today Proc. 2020, 37, 1869–1875.
[2]https://cryptobook.nakov.com/asymmetric-key-ciphers/ecc-encryption-decryption
[3]https://www.cloudflare.com/en- in/learning/ssl/what- is-encryption/
[4] Bhardwaj, K.; Chaudhary, S. Implementation of elliptic curve cryptography in „C?. Int. J.
Emerg. Technol. 2012, 3, 38–51.
[5]Ogiela, U. Cognitive cryptography for data security in cloud computing. Concurr. Comput.
Pr. Exp. 2019, 32, e5557.
[6]Sood, S.K. A combined approach to ensure data security in cloud computing. J. Netw.
Comput. Appl. 2012, 35, 1831–1838. [Google Scholar]
[7 ] Mendonca, S.N. Data security in cloud using AES. Int.J.Eng. Res. Technol. 2018, 7.
[8] Suresha, R.G. Enhancing security in cloud storage using ecc algorithm. Int. J. Sci. Res. 2013,
2–8. Available online: https://www.ijsr.net/archive/v2i7/MDIwMTM3NA==.pdf (accessed on 22
October 2021).
[9] Abbas, S.; Maryoosh, A.A. Improving data storage security in cloud computing using elliptic
curve cryptography. IOSR J. Comput. Eng. 2015, 17, 48–53.
[10]SamikshaSharma,VinayChopra“ANALYSIS OF AES ENCRYPTION WITH ECC”
[11]”Enhanced Cloud Storage Security Using ECC-AES A Hybrid Approach”
[12] Borse Manoj V. Bhandure Harshad D. Patil Dhiraj M. Bhad Pratik B “Location Based
Encryption-Decryption Approach for Data Security”
[13] Obaida Mohammad Awad Al-Hazaimeh” A NEW APPROACH FOR COMPLEX
ENCRYPTING AND DECRYPTING DATA”
[14] SHASHANK, S.K. Saravanan, G. Rekha” Information Security in Big Data using
Encryption and Decryption”