Title | Development of an Algorithmic Approach for Hiding Sensitive Data and Recovery of Data based on Fingerprint Identification for Secure Cloud Storage |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Lokhande, Trupti, Sonekar, Shrikant, Wani, Aachal |
Conference Name | 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN) |
Keywords | 3DES (Triple-data Encryption Standard), authentication, cloud computing, cloud storage service, compositionality, data integrity, Distributed databases, Encryption, encryption audits, fingerprint identification, Fingerprint recognition, Integrity Auditing, MD5 (Message Digest), Predictive Metrics, pubcrawl, Resiliency, security, Three-dimensional displays |
Abstract | Information Security is a unified piece of information technology that has emerged as vibrant technology in the last two decades. To manage security, authentication assumes a significant part. Biometric is the physical unique identification as well as authentication for the third party. We have proposed the security model for preventing many attacks so we are used the innermost layer as a 3DES (Triple Encryption standard) cryptography algorithm that is providing 3- key protection as 64-bit and the outermost layer used the MD5 (Message Digest) algorithm. i. e. providing 128-bit protection as well as we is using fingerprint identification as physical security that is used in third-party remote integrity auditing. Remote data integrity auditing is proposed to ensure the uprightness of the information put away in the cloud. Data Storage of cloud services has expanded paces of acknowledgment because of their adaptability and the worry of the security and privacy levels. The large number of integrity and security issues that arise depends on the difference between the customer and the service provider in the sense of an external auditor. The remote data integrity auditing is at this point prepared to be viably executed. In the meantime, the proposed scheme is depending on identity-based cryptography, which works on the convoluted testament of the executives. The safety investigation and the exhibition assessment show that the planned property is safe and productive. |
DOI | 10.1109/SPIN52536.2021.9566026 |
Citation Key | lokhande_development_2021 |