首页    期刊浏览 2024年09月19日 星期四
登录注册

文章基本信息

  • 标题:Cloud Computing – Key Hashing Cryptographic Implication based Algorithm for Service Provider based Encryption and Decryption
  • 本地全文:下载
  • 作者:D. Ramesh ; Dr. B ; Rama
  • 期刊名称:International Journal of Computer Trends and Technology
  • 电子版ISSN:2231-2803
  • 出版年度:2017
  • 卷号:49
  • 期号:4
  • 页码:246-252
  • DOI:10.14445/22312803/IJCTT-V49P140
  • 出版社:Seventh Sense Research Group
  • 摘要:The cloud computing data storage and retrieval based service providers are representing the client environmental based encryption techniques to avoid and restrict the unauthorized access along with privacy of the data, it provides the services of high securable data delivery and flexible data storage. The main role of encryption is to provide the provision to protect the sensitive data and play the key role for business developments. The main problem will be raised when the system will maintain the ownership control and to present the latest set of technical and business concerns. Many complex problems and challenges are waiting for the optimistic solutions, some of the problems, such as in the structured storage based environment, the provision of encryption environment for the data when it preserve selfability to access the key elements along with their files which necessitate belonging to the plaintext; the data owners must maintain the privacy based control over their own data to make certain inclusive service based functionalities; and the data owners will face difficult to control their own data which available in cloud and their cloud based internal services such as type of data based topology architecture along with their functionalities, related security active models for employ the data security within their schemes and organizational services along with the encrypted based data access control. To overcome theses in convinces this paper is proposing the technical ideal through the algorithmic methodology along the graphical flow architecture. This paper is proposing the key hashing based cryptographic algorithmic flow chart implications and hashing algorithm techniques for service provider encryption and decryption end pointing mechanism to reduce the above mention complex difficulties; it describes the primary encryption based techniques and various levels of cryptographic algorithms with their implications. And also it has expressed how the hash functions can be extended in cloud based data security and digital forensics based applications.
  • 关键词:Encryption based Integrity (EbI); Key-Logging Facility (KLF); Cloud based Service Providers (CbSP); Information based Security (IbS); single mode encryption (SME); Application based Desired Plain Text (AbDPT); Application based Other Plain Text (AbOPT); p
国家哲学社会科学文献中心版权所有