Visible to the public Cloud Cryptography: User End Encryption

TitleCloud Cryptography: User End Encryption
Publication TypeConference Paper
Year of Publication2020
AuthorsNooh, Sameer A.
Conference Name2020 International Conference on Computing and Information Technology (ICCIT-1441)
Date PublishedSept. 2020
PublisherIEEE
ISBN Number978-1-7281-2680-7
KeywordsBusiness, Ciphers, cloud, cloud computing, cloud computing security, cryptography, decryption, Encryption, Google, key generation, Metrics, pubcrawl, resilience, Resiliency, Scalability, user privacy, user privacy in the cloud
AbstractCloud computing has made the life of individual users and work of business corporations so much easier by providing them data storage services at very low costs. Individual users can store and access their data through shared cloud storage service anywhere anytime. Similarly, business corporation consumers of cloud computing can store, manage, process and access their big data with quite an ease. However, the security and privacy of users' data remains vulnerable in cloud computing Availability, integrity and confidentiality are the three primary elements that users consider before signing up for cloud computing services. Many public and private cloud services have experienced security breaches and unauthorized access incidents. This paper suggests user end cryptography of data before uploading it to a cloud storage service platform like Google Drive, Microsoft, Amazon and CloudSim etc. The proposed cryptography algorithm is based on symmetric key cryptography model and has been implemented on Amazon S3 cloud space service.
URLhttps://ieeexplore.ieee.org/document/9213745
DOI10.1109/ICCIT-144147971.2020.9213745
Citation Keynooh_cloud_2020