EFFICIENT MULTI-LEVEL ENCRYPTION PROCEDURE FOR CLOUD SECURITY

Authors:

Sampath Kumar Tallapally,B. Manjula,

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00031

Keywords:

Cloud security,single level encryption,multilevel security scheme,cloud data,

Abstract

Cloud space to yourself is a one of the most considerable tentative issue in cloud computing as some of the clients are satisfied with existing policies or protocols where as rest of them are quite concerned with the aspects of corresponding security [IV].In order to enhance the security levels in this paper we have proposed a multilevel security scheme that provides more security than that of any type of the existing single level encryption based process. In particular the proposed technique ensures that only pre authorized users can only access the cloud data and the other advantage of our algorithm is faster and safer in multiple directions such as while performing uploading and downloading a specific file [X].

Refference:

I. https://en.wikipedia.org/wiki/Cloud_computing_

II. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

III. https://en.wikipedia.org/wiki/Elliptic-curve_cryptography

IV. https://en.wikipedia.org/wiki/Hessian_form_of_an_elliptic_curve

V. R Ravi Kumar M Babu Reddy P Praveen, “An Evaluation Of Feature Selection Algorithms In Machine Learning” International Journal Of Scientific & Technology Research Volume 8, Issue 12, December 2019 ISSN 2277-8616,PP. 2071-2074.

VI. T. Sampath Kumar, B. Manjula “Perusing on Cloud Computing and its Security Issues”. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-2, December, 2019

VII. T. Sampath Kumar, B. Manjula “Security Issue Analysis on Cloud Computing Based System” International Journal of Future Generation Communication and Networking Vol. 12, No. 5, (2019), pp. 143 – 150

VIII. T. Sampath Kumar, B. Manjula, “Asymmetric AES Algorithm for Cloud Security”, International Journal of Future Generation Communication and Networking Vol. 12, No. 5, (2019), pp. 301- 305

IX. R. Ravi Kumar, M. Babu Reddy and P. Praveen, “A review of feature subset selection on unsupervised learning,” 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, 2017, pp. 163-167.doi: 10.1109/AEEICB.2017.7972404.

X. Sanjoli Singla and Jasmeet Singh ,“Cloud Data Security using Authentication and Encryption Technique” by in IJARCET Vol 2, Issue 7, July 2013.

XI. Survey on triple system security in cloud computing by ParulMukhi and Bhawna Chauhan in IJCSMC, Vol. 3, Issue. 4, April 2014.

XII. T. Sampath Kumar,B. Manjula, D. Srinivas,”A New Technique to Secure Data Over Cloud”, Jour of Adv Research in Dynamical & Control Systems, 11-Special Issue, July 2017.

XIII. T. Sampath Kumar, B. Manjula, Mohammed Ali Shaik, Dr. P. Praveen, “A Comprehensive Study on Single Sign on Technique”, International Journal of Advanced Science and Technology (IJAST), ISSN:2005-4238E-ISSN:2207-6360, Vol-127-June-2019.

XIV. Praveen P., Rama B(2020). “An Optimized Clustering Method To Create Clusters Efficiently” Journal Of Mechanics Of Continua And Mathematical Sciences, ISSN (Online): 2454 -7190 Vol.-15, No.-1, January (2020) pp 339-348 ISSN (Print) 0973-8975 https://doi.org/10.26782/jmcms.2020.01.00027.

XV. Praveen., P and Ch. Jayanth Babu. “Big Data Clustering: Applying Conventional Data Mining Techniques in Big Data Environment.” (2019).Innovations in Computer Science and Engineering, Lecture Notes in Networks and Systems 74, ISSN 2367-3370, https://doi.org/10.1007/978-981-13-7082-3_58 Springer Singapore.

View Download