An efficient data security mechanism with data sharing and authentication
Journal: ACCENTS Transactions on Information Security (TIS) (Vol.5, No. 19)Publication Date: 2020-07-27
Authors : Farooque Kailash Patidar Rishi Kushwah; Gaurav Saxena;
Page : 26-31
Keywords : Cloud computing; AES-256; RC6; U to U; C to U; U to C.;
Abstract
In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.
Other Latest Articles
- An efficient clustering mechanism in big data framework for data preprocessing and management
- An efficient logistic regression and ant colony optimization-based object-oriented quality prediction
- Survey and analysis of cloud data management and security
- Object oriented quality prediction through artificial intelligence and machine learning: a survey
Last modified: 2020-10-16 18:38:40