您好,欢迎访问上海市农业科学院 机构知识库!

An Innovative Method for Authenticating and Accounting for Cloud-based Financial Transactions is to Publicly Disseminate the User's Private Key

文献类型: 会议论文

第一作者: Pravin R. Nerkar

作者: Pravin R. Nerkar 1 ; Manoj K. Ramaiya 2 ;

作者机构: 1.Compuetr Science, Sage University, Indore, India

2.Advance Computing Sage University, Indore, India

关键词: Cloud computing;Computational modeling;Scalability;Memory;Ubiquitous computing;Software;Encryption

会议名称: International Conference on Ubiquitous Computing and Intelligent Information Systems

主办单位:

页码: 463-468

摘要: Cloud computing (the practice of storing data on remote servers) is a fast and economical way for businesses to develop with little to no additional capital investment. One of the most appealing aspects of cloud data storage solutions is the scalability to accommodate ever-increasing data loads. When data is stored and accessible over the internet, as it is in a cloud environment, its integrity might be compromised and customers can become dissatisfied. Users can buy computing resources, data storage, and a plethora of other software services online and tailor them to their specific needs. In cloud computing, users can tap into an abundance of shared computing resources. Modern cloud computing systems rely on asymmetric and traditional public key cryptography for data security and mutual authentication. Data security and protection are improved by this research without any loss of data quality. The data are separated into three categories, with the owner assigning importance to each. Before being stored in the cloud, data from each layer might be encrypted using a separate key. The data will be protected from intruders and other threats using this way. It will also be easier and cheaper to keep encrypted data in the cloud. This study employs the Advanced Encryption Standard (AES) throughout the model's creation in order to gauge its reliability.

分类号: tp393-53

  • 相关文献

[1]Blockchain Cloud Computing: Comparative study on DDoS, MITM and SQL Injection Attack. Mamta Swarnkar,Shekh Kulsum Almas,Nagendra Singh,Harsh Pratap Singh,Anuprita Mishra,Anula Khare. 2024

[2]Hybrid Confidentiality Framework for Secured Cloud Computing. Gaurav Shrivastava,Sachin Patel. 2022

[3]Sentiment Analysis Using Hadoop Framework and Machine Learning Approach. Ritu Patidar,Sachin Patel. 2023

[4]Design of an Augmented Clustering Model using LEACH & PEGASIS for Low Complexity & High Network Lifetime. Jaya Raut,Akhilesh Upadhyay. 2022

[5]Empowering Smart Cities: A Comprehensive Edge Computing Framework for Enhanced IoT Situation Awareness. Pooja Vishwakarma,Pinaki Ghosh. 2023

[6]Building Common Ground: An Inter-Institutional Computing & Engineering Education Transfer Learning Community. Danyelle Tauryce Ireland,Rebecca Zarch,Ilana Hipshman,Ashley Clark. 2021

[7]Computer Vision-Based Assistance System for Visually Impaired Individuals in Vending Machine Interactions. Karla Miriam Reyes Leiva,Roy Abi Zeid Daou,José Javier Serrano Olmedo. 2023

[8]A Comparative Study of Various Learning Models for Object Detection in Contextual Scene Interpretation. Taranpreet Singh,Dr.Hemang Shrivastava. 2023

作者其他论文 更多>>