Visible to the public Securely Distributing Files in Cloud Environment by Dispensing Asymmetric Key Management System applying Hashing

TitleSecurely Distributing Files in Cloud Environment by Dispensing Asymmetric Key Management System applying Hashing
Publication TypeConference Paper
Year of Publication2021
AuthorsJahan, Nusrat, Mahmood, Md. Ashiq
Conference Name2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS)
Date Publishedmar
KeywordsAsymmetric Encryption, cloud computing, compositionality, Compression function, data integrity, data protection, Encryption, Hash functions, Human Behavior, Metrics, pubcrawl, Public key, Resiliency, security policies, Software
AbstractAn emerging widely used technology cloud computing which a paddle of computing resources is available for the users. Through the internet-based the resources could be supplied to cloud consumers at their request but it is not directly active management by the user. This application-based software infrastructure can store data on remote serves, which can be accessed through the internet and a user who wants to access data stored in the cloud have to use an internet browser or cloud computing software. Data protection has become one of the significant issues in cloud computing when users must rely on their cloud providers for security purposes. In this article, a system that can embarrass the disclosure of the key for distributing a file that will assure security dispensing asymmetric key and sharing it among the cloud environment and user perform the integrity check themselves rather than using third-party services by using compression or hash function where the hash is created using a hash function and it was not mentioned in the previous paper. After the user receives the data every hash is compared with other hash values to check the differences of the data. The time-consumption of encryption and decryption of the data is calculated and compared with the previous paper and the experiment shows that our calculation took around 80% less time.
DOI10.1109/ICAIS50930.2021.9396025
Citation Keyjahan_securely_2021