Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Nikhitha K. Nair; Navin K. S.;
Page : 1056-1059
Keywords : Cloud computing; Dual encryption; User- Revocation; Third-party Auditing;
Abstract
Cloud computing in the domain of distributed systems introduces many challenges in the day-to-day life. One of the main challenges is data security and privacy. Security on cloud data can be enhanced using dual encryption. Different encryption techniques such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), Triple DES, Exclusive-OR (XOR), Rivest, Shamir and Adleman (RSA) are used for this purpose. The encryption techniques such as Exclusive-OR (XOR) and Advanced Encryption Standard (AES) can be used together to perform dual encryption on the cloud data. By utilizing cloud to re-sign the blocks that were previously signed by the revoked user on behalf of existing users, efficient user revocation can be performed. Auditing by the Third party auditor ensures the integrity of data stored in the cloud.
Other Latest Articles
- Enhancing the Protection scheme for FACTS-Based Transmission Lines using a Data Mining Model
- Right to Education
- Complementary Metal-Oxide Semiconductor: A Review
- Indian Manufacturing Sector: A Review on the Problems&Declining Scenario of Indian Industries
- The Effects of Integrated Marketing Communicationson Brand Equity of Authorized Automotives Companies in Indonesia
Last modified: 2021-06-30 21:44:39