您好,欢迎访问上海市农业科学院 机构知识库!

Hybrid Confidentiality Framework for Secured Cloud Computing

文献类型: 会议论文

第一作者: Gaurav Shrivastava

作者: Gaurav Shrivastava 1 ; Sachin Patel 1 ;

作者机构: 1.Department of Computer Science & Engineering, SAGE University, Indore

关键词: Cloud computing;Analytical models;Java;File systems;Computational modeling;Size measurement;Web servers

会议名称: IEEE Global Conference for Advancement in Technology

主办单位:

页码: 1-5

摘要: Cloud computing has emerged as a time changing technology provides variety of applications in shared mode. It provides an anytime, anywhere, anything over the Internet with one-stop service to end users. Open nature and public network make it vulnerable and security prone for several security threats. This paper investigates that single security algorithm may be easy target to compromise communication and intercept messages. Subsequently wide use and heavy traffic also raise concern of overload and performance. To keep the tradeoff between performance and security, a hybrid encryption model has been proposed based on two symmetric key cryptographic techniques. RC6 and Blowfish algorithms with 256 bit key long to create hard secure ecosystem. To associate originality and integrity, it involves MD5 and message digest solution for individual chunk. File chunking system has been implemented as like Google File System to consider large file with high performance. Proposed solution has been implemented using java technology through REST API and deployed on Amazon Web Server -EC2 instance. Performance evolution has been done in terms of computation time, memory complexity for different file size. Experimental analysis concludes that hybrid model enhances the encryption time but symmetric algorithms help to keep tradeoff between security and performance in comparison of asymmetric key cryptographic hybrid model.

分类号: tp3

  • 相关文献

[1]An Innovative Method for Authenticating and Accounting for Cloud-based Financial Transactions is to Publicly Disseminate the User's Private Key. Pravin R. Nerkar,Manoj K. Ramaiya. 2023

[2]A Comparative Study of Various Learning Models for Object Detection in Contextual Scene Interpretation. Taranpreet Singh,Dr.Hemang Shrivastava. 2023

[3]Design & Implementation of Product Recommendation Solution using Sentiment Analysis. Ritu Patidar,Sachin Patel. 2022

[4]Empowering Smart Cities: A Comprehensive Edge Computing Framework for Enhanced IoT Situation Awareness. Pooja Vishwakarma,Pinaki Ghosh. 2023

[5]Detecting Vehicular Networking Node Misbehaviour Using Machine Learning. Saleha Saudagar,Rekha Ranawat. 2023

[6]Building a Model in Discovering Multivariate Causal Rules for Exploratory Analyses. Shkurte Luma-Osmani,Florije Ismaili,Parashu Ram Pal. 2021

[7]Building Common Ground: An Inter-Institutional Computing & Engineering Education Transfer Learning Community. Danyelle Tauryce Ireland,Rebecca Zarch,Ilana Hipshman,Ashley Clark. 2021

[8]Computer Vision-Based Assistance System for Visually Impaired Individuals in Vending Machine Interactions. Karla Miriam Reyes Leiva,Roy Abi Zeid Daou,José Javier Serrano Olmedo. 2023

[9]Blockchain Cloud Computing: Comparative study on DDoS, MITM and SQL Injection Attack. Mamta Swarnkar,Shekh Kulsum Almas,Nagendra Singh,Harsh Pratap Singh,Anuprita Mishra,Anula Khare. 2024

作者其他论文 更多>>