首页    期刊浏览 2024年10月04日 星期五
登录注册

文章基本信息

  • 标题:Multilevel Authentication based Data Security and Verification over Cloud Computing Environment
  • 本地全文:下载
  • 作者:Deepak Soni ; Nishchol Mishra
  • 期刊名称:International Journal of Education and Management Engineering(IJEME)
  • 印刷版ISSN:2305-3623
  • 电子版ISSN:2305-8463
  • 出版年度:2017
  • 卷号:7
  • 期号:5
  • 页码:56-68
  • DOI:10.5815/ijeme.2017.05.06
  • 出版社:MECS Publisher
  • 摘要:There are various algorithm proposed in the area of cloud computing environment. Now a days the cloud computing is the very interesting area for research purpose. Cloud computing environment provides the security of user data and integrity verification with the users data, also cloud provide on demand network access to a shared pool of configurable computing resources like network, servers, storage, applications and services that can be rapidly provisioned and provide with minimum user effort and service provider interaction. Uses of cloud computing services is very easy and also in very low cost. The cloud computing services are on demand over the internet, so it provides the facility to clients that access these services remotely from anywhere, anytime with the help of internet and any devices like pc, laptop mobiles etc. The data or information of cloud user is save in cloud service provider so in the cloud computing environment the security of data and privacy of data is primary issue[1]. In this paper a security model is proposed here we provide a mechanism to cloud user to encrypt their data or sensitive information and generate a integrity verification key then save the data on cloud in encrypted form. The cloud user have many choices like private phase, public phase and hybrid phase and the hybrid phase tier1 and tier 2. In all three sections there are various encryption techniques are implemented like AES (Advanced Encryption Scheme)[9], IDEA, Blowfish[12], And SAES based on the security factors namely authentication, confidentiality, security, privacy, non-repudiation and integrity. In Private phase a Unique token generation mechanism with the help of SHA-2 implemented it helps to ensure the authenticity of the user, The Hybrid section of the model provides On Demand Security Choices Tier one or Tier two and Public section provides faster execution with the help of Blowfish algorithm. Overall the user data Is wrapped in two folds of encryption and integrity verification in all sections.
  • 关键词:AES;IDEA;SAES; SHA-2;Blowfish;Hash key;Data Privacy;Data Security
国家哲学社会科学文献中心版权所有