ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An efficient data security mechanism with data sharing and authentication

Journal: ACCENTS Transactions on Information Security (TIS) (Vol.5, No. 19)

Publication Date:

Authors : ; ;

Page : 26-31

Keywords : Cloud computing; AES-256; RC6; U to U; C to U; U to C.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.

Last modified: 2020-10-16 18:38:40