Javascript must be enabled to continue!
Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption
View through CrossRef
This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user during the creation of the account. The encryption keyword will be hashed by the system using MD5 Algorithm. The keys will remain in encrypted form, while they are on the server side. Both encrypted data, encryption and decryption keys will be saved on the server in secured form. The idea behind hashing the encryption keys is to protect the keys while they are stored on the server, therefore, any unauthorized access to the server will gain no advantages since every bit of data on the server is encrypted including the private keys. The proposed system design will participate by improving the security and privacy of the users by giving them the capability to encrypt and decrypt data in enhanced way using AES as a data encryption method and MD5 hash algorithm for encrypting the encryption keys.
Science Publishing Corporation
Title: Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption
Description:
This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage.
Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access.
This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy.
In the proposed system design, the AES Algorithm will handle the encryption of the data using a keyword which will be defined by the user during the creation of the account.
The encryption keyword will be hashed by the system using MD5 Algorithm.
The keys will remain in encrypted form, while they are on the server side.
Both encrypted data, encryption and decryption keys will be saved on the server in secured form.
The idea behind hashing the encryption keys is to protect the keys while they are stored on the server, therefore, any unauthorized access to the server will gain no advantages since every bit of data on the server is encrypted including the private keys.
The proposed system design will participate by improving the security and privacy of the users by giving them the capability to encrypt and decrypt data in enhanced way using AES as a data encryption method and MD5 hash algorithm for encrypting the encryption keys.
.
Related Results
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Energy‐aware cross‐layer resource allocation in mobile cloud
Energy‐aware cross‐layer resource allocation in mobile cloud
SummaryThis paper proposed an energy‐aware cross‐layer mobile cloud resource allocation approach. In this paper, a hybrid cloud architecture is adopted for provisioning mobile serv...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...

