Title | A Effective Encryption and Different Integrity Schemes to Improve the Performance of Cloud Services |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Narayanan, K. Lakshmi, Naresh, R. |
Conference Name | 2022 International Conference for Advancement in Technology (ICONAT) |
Keywords | AES, Classification algorithms, cloud computing, compositionality, CSP, DAP, DES, Encryption, encryption audits, ID-DPDP, Market research, Measurement, Metrics, Optimized production technology, privacy, pubcrawl, resilience, Resiliency, TPA |
Abstract | Recent modern era becomes a multi-user environment. It's hard to store and retrieve data in secure manner at the end user side is a hectic challenge. Difference of Cloud computing compare to Network Computing can be accessed from multiple company servers. Cloud computing makes the users and organization to opt their services. Due to effective growth of the Cloud Technology. Data security, Data Privacy key validation and tracing of user are severe concern. It is hard to trace malicious users who misuse the secrecy. To reduce the rate of misuse in secrecy user revocation is used. Audit Log helps in Maintaining the history of malicious user also helps in maintaining the data integrity in cloud. Cloud Monitoring Metrics helps in the evaluation survey study of different Metrics. In this paper we give an in depth survey about Back-end of cloud services their concerns and the importance of privacy in cloud, Privacy Mechanism in cloud, Ways to Improve the Privacy in cloud, Hazards, Cloud Computing Issues and Challenges we discuss the need of cryptography and a survey of existing cryptographic algorithms. We discuss about the auditing and its classifications with respect to comparative study. In this paper analyzed various encryption schemes and auditing schemes with several existing algorithms which help in the improvement of cloud services. |
DOI | 10.1109/ICONAT53423.2022.9725904 |
Citation Key | narayanan_effective_2022 |