Efficiently Encryption Decryption schema for Secure File Storage System in Cloud Computing

نویسندگان

چکیده

Cloud computing finds applications in different industries, providing various services and data storage capabilities. While stored the cloud can be retrieved based on user requests, security remains a primary concern. To address these concerns, proposed system employs combined strength of Triple Data Encryption Standard (AES) Blowfish algorithms. The lack robust efficient secure file systems poses significant risks to confidentiality integrity.Existing solutions often strong encryption mechanisms reliable server-side decryption This research aims develop that leverages server techniques ensure confidentiality, integrity, access control environments. objective is design effectively protects sensitive files during storage, transmission, processing, while maintaining retrieval for authorized users. Key Words: Server-Side Encryption, Secure Storage Decryption, File Storage,

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user divides the data into blocks, encrypts and stores them in various storage servers. The stora...

متن کامل

High-Throughput Encryption for Cloud Computing Storage System

In recent years Cloud computing has become the infrastructure which small and medium-sized businesses are increasingly adopting for their IT and computational needs. It provides a platform for high performance and throughput oriented computing, and massive data storage. Subsequently, novel tools and technologies are needed to handle this new infrastructure. One of the biggest challenges in this...

متن کامل

Secure Cloud Computing through Homomorphic Encryption

Go to the cloud, has always been the dream of man. Cloud Computing offers a number of benefits and services to its customers who pay the use of hardware and software resources (servers hosted in data centers, applications, software...) on demand which they can access via internet without the need of expensive computers or a large storage system capacity and without paying any equipment maintena...

متن کامل

Secure Data Storage in Mobile Cloud Computing

In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Com...

متن کامل

Secure Distributed Data Storage in Cloud Computing

Cloud computing has gained great attention from both industry and academia since 2007.With the goal of providingusersmore flexible services in a transparent manner, all services are allocated in a “cloud” that actually is a collection of devices and resources connected through the Internet. One of the core services provided by cloud computing is data storage. This poses new challenges in creati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Scientific Journal Of Research In Engineering And Management

سال: 2023

ISSN: ['2582-3930']

DOI: https://doi.org/10.55041/ijsrem25005