Paper Details

Data Security Using Dual layer in Cloud Computing

Vol. 6, Jan-Dec 2020 | Page: 34-38

Trisha Sharma
Sacred Heart Senior Secondary School, Chandigarh.

Received: 12-01-2020, Accepted: 02-03-2020, Published Online: 18-03-2020


. Download Full Paper

Abstract

One of the essential benefits of distributed computing is dividing information between different associations. Nonetheless, this advantage itself has a gamble on the news. To refute the likely danger to the report, protecting data is essential. Encryption is a massively powerful machine for safeguarding information. This paper proposes another period of cryptographic double-layer encryption to make the information put away in the cloud safer and more dependable. There are promptly accessible numerous encryption procedures accessible at present yet unfit to give adequate security. This paper means to recommend another encryption strategy named double encryption. It depends on the well-known encryption calculation AES, a symmetric-key calculation. We will propose an extra layer of bunny calculation around scrambled information, which will assist with giving more excellent protection from Bruteforce, what's more, one more kind of attack. If an attacker distinguishes a solitary key of the cryptosystem, it is preposterous to decode the first message. This paper expects to recommend a viewpoint that is a twofold layer encryption strategy to guarantee security in the cloud. In this proposed twofold layers encryption plot, the information will be obtained while secured and partaken in a cloud climate. This plan takes full advantage of the excellent handling ability of distributed computing and can productively guarantee cloud information protection and security. You can order cheap and high quality UK replica watches here.
If you wanna buy best UK fake breitling watches, you cannot miss this website.
Swiss AAA replica watches UK for sale are worth having. You can place an order online conveniently and efficiently.

References

  1. Biswajita Datta, Akash Roy, Romit Dutta, Samir Kumar Bandyopadhyay “Secure Communication through Double Layer Security with Efficient Key Transmission” 2018 International Conference on Information Technology (ICIT) (IEEE)
  2. Dr.D.Usha, M.Subbbulakshmi “Double Layer Encryption Algorithm Key Cryptography for Secure Data Sharing in Cloud” International Journal of Scientific & Engineering Research Volume 9, Issue 5, May-2018
  3. Shivani Chauhan, Jyotsna, Janmejai Kumar, Amit Doegar “Multiple layer Text security using Variable block size Cryptography and Image Steganography” 3rd IEEE International Conference on "Computational Intelligence and Communication Technology" (IEEE-CICT 2017)
  4. Gahan A V, Geetha D Devanagavi “A Empirical Study of Security Issues In Encryption Techniques” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 5 (2019)
  5. Ashok Kumar, Santhosha, A.Jagan “Two layer Security for data storage in cloud” 2015 1st International conference on futuristic trend in computational analysis and knowledge management (ABLAZE 2015)
  6. Naveen N, K.Thippeswamy "Security and Privacy Challenges Using Multi-Layer Encryption Approaches In Cloud Computing Environments” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8 June, 2019
  7. 7. Afnan Ullah Khan, Manuel Oriol, Mariam Kiran, Ming Jiang, Karim Djemame “Security Risks and their Management in Cloud Computing” 2012 IEEE 4th International Conference on Cloud Computing Technology and Science
  8. F.Sabahi, “Virtualization-level security in cloud computing,” 3rd Int. 2011 IEEE Conf. Commun. Softw. Networks, pp. 250–254, 2011
  9. D. Descher, M., Masser, P., Feilhauer. and Huemer, and A. Klein “Retaining data control to the client in infrastructure clouds,” Int. Conf. Availability, Reliab. Secur. (pp. 9-16). IEEE., pp. pp. 9–16, 2009.
  10. Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.
  11. C. Modi, D. Patel, B. Borisaniya, M. Rajarajan, and A. Patel “A survey on security issues and solutions at different layers of Cloud computing,” J.Supercomputer., vol. 63, no. 2, pp. 561–592, 2013.
  12. L. Rodero-Merino, L. M. Vaquero, E. Caron, F. Desprez, and A. Muresan, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, no. 1, pp. 96–108, 2012.
  13. E. Mohamed, “Enhance data secure model for cloud computing,” Informatics Syst. (INFOS), 2012 8th Int. Conf., pp. 12–17, 2012
  14. J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics,” Build. Infrastruct. Cloud Secure., vol. 1, no. September 2011, pp. 3–22, 2014.
  15. P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
  16. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011.