Title | Cloud Cryptography: User End Encryption |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Nooh, Sameer A. |
Conference Name | 2020 International Conference on Computing and Information Technology (ICCIT-1441) |
Date Published | Sept. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-2680-7 |
Keywords | Business, Ciphers, cloud, cloud computing, cloud computing security, cryptography, decryption, Encryption, Google, key generation, Metrics, pubcrawl, resilience, Resiliency, Scalability, user privacy, user privacy in the cloud |
Abstract | Cloud computing has made the life of individual users and work of business corporations so much easier by providing them data storage services at very low costs. Individual users can store and access their data through shared cloud storage service anywhere anytime. Similarly, business corporation consumers of cloud computing can store, manage, process and access their big data with quite an ease. However, the security and privacy of users' data remains vulnerable in cloud computing Availability, integrity and confidentiality are the three primary elements that users consider before signing up for cloud computing services. Many public and private cloud services have experienced security breaches and unauthorized access incidents. This paper suggests user end cryptography of data before uploading it to a cloud storage service platform like Google Drive, Microsoft, Amazon and CloudSim etc. The proposed cryptography algorithm is based on symmetric key cryptography model and has been implemented on Amazon S3 cloud space service. |
URL | https://ieeexplore.ieee.org/document/9213745 |
DOI | 10.1109/ICCIT-144147971.2020.9213745 |
Citation Key | nooh_cloud_2020 |