Obtaining Data Security using Cloud Computing and Cryptographic Algorithms |
Author(s): |
Deepthy S , Mount Zion College of Engineering,Kadammanitta; Vidya Vijayan, Mount Zion College of Engineering,Kadammanitta |
Keywords: |
AES, RSA and SHA-1 algorithm, Cloud Computing, Cryptographic Algorithms |
Abstract |
Cloud storage involves stashing data on hardware in a remote physical location, which can be accessed from any device via the internet. Clients send files to a data server maintained by a cloud provider instead of storing it on their own hard drives. It is readily manageable by the Internet, a cloud infrastructure can be accessed by enterprises easily and quickly. The data can be accessed from anywhere and anytime. In this paper we aim to provide a set of technology protection designed to protect resources from leakage, theft, or data loss. AES and RSA which are from symmetric, asymmetric cryptographic algorithm. We propose a combination of AES, RSA and SHA-1 algorithm for optimum cloud security. Our approach ensures the security and privacy of client sensitive information by storing data across single cloud, using AES, RSA and SHA-1 algorithm. |
Other Details |
Paper ID: IJSRDV7I100413 Published in: Volume : 7, Issue : 10 Publication Date: 01/01/2020 Page(s): 636-638 |
Article Preview |
|
|