Multilevel Security for Data as a Service (Spacebox) Using Cryptography
Journal: International Journal of Computer Techniques (Vol.5, No. 2)Publication Date: 2018-04-30
Authors : Sachin H. Darekar Sayali Zende Prerana Pawar Akanksha Pinglaskar;
Page : 83-85
Keywords : -;
Abstract
There Abstract- cryptanalyst are professional in how to fracture the encryption techniques. We require securing our programs and documents from cryptanalyst. Security of information means protecting data from unauthorized right to use in cloud environment. There are many techniques to reach the security of information from unauthorized entrance. There are two cryptographic techniques used for data encryption which are symmetric and Asymmetric techniques. Symmetric key encryption algorithms are computationally fast compared to asymmetric encryption algorithms (Like RSA). However, since the identical secret key is used for symmetric encryption and decryption, we have the crisis of securely distributing that secret key. Asymmetric key infrastructure in PKI does not rely on circulation of any private key. However, the familiar asymmetric algorithms are used for bulk encryption with recent computation capability. While SHA is collision resistant to a variety of block cipher algorithms. Thus for superior security performance, we propose a system which would integrate the advantages of these algorithms namely SHA, RSA which will be a hybrid approach of encrypting data. SHA is adopted in this mechanism to verify the integrity of the significance. Three major security principle such as authentication, confidentiality and integrity are achieved together using this method.
Other Latest Articles
- Enhancement and Performance Analysis of VoIP Algorithms in Wireless Networks
- Improvement of Fault Ride-through capability in DFIG wind turbine with Fuzzy controlled SFCL
- Detecting Malware and Searching Rank Fraudulent Behavior In Google Play
- Credit Card Nearest Neighbor Based Outlier Detection Techniques
- Techniques for Extending Computation and Resources in Mobile Devices
Last modified: 2018-05-19 14:45:58