Javascript must be enabled to continue!
A Layered Approach For Improved Cloud Storage Security And Protection Of Access Policy
View through CrossRef
Information technology provides a service called cloud computing, which offers many beneficial functions. But there are a lot of problems and drawbacks with cloud computing, the most significant of which is the uncertainty and possible danger presented by the privacy and security restrictions. According to reports, there are reportedly fewer real-time cloud apps made exclusively for businesses than there are for consumers. This is allegedly due to concerns about security. When dealing with suppliers that have a questionable reputation, it is essential to ensure that the cloud management and service provider rigorously adheres to the highest standards of security and privacy. This study recommends enhancing the security protocols for sensitive data in cloud computing by using multi-layer encryption methods. The security and privacy of data kept on a cloud server may be greatly improved by using the layer-wise encryption technique. As a consequence, there is an improvement in security for both the cloud provider and the data owner. Users are essentially prevented from accessing the data by this encryption method unless the data owner specifically grants permission. The advanced encryption standard (AES) symmetric encryption method and the Rivest-Shamir Adleman (RSA) asymmetric encryption method are among the suggested approaches. Users who want to receive messages in the symmetric encryption process must exchange a special, unique key. On the other hand, asymmetric encryption encrypts and decrypts communications as they are being sent using both a private key and a public key. Then, a viability analysis is carried out for the two encryption algorithms previously mentioned, which are responsible for protecting the confidentiality and integrity of the data related to the other techniques.
Title: A Layered Approach For Improved Cloud Storage Security And Protection Of Access Policy
Description:
Information technology provides a service called cloud computing, which offers many beneficial functions.
But there are a lot of problems and drawbacks with cloud computing, the most significant of which is the uncertainty and possible danger presented by the privacy and security restrictions.
According to reports, there are reportedly fewer real-time cloud apps made exclusively for businesses than there are for consumers.
This is allegedly due to concerns about security.
When dealing with suppliers that have a questionable reputation, it is essential to ensure that the cloud management and service provider rigorously adheres to the highest standards of security and privacy.
This study recommends enhancing the security protocols for sensitive data in cloud computing by using multi-layer encryption methods.
The security and privacy of data kept on a cloud server may be greatly improved by using the layer-wise encryption technique.
As a consequence, there is an improvement in security for both the cloud provider and the data owner.
Users are essentially prevented from accessing the data by this encryption method unless the data owner specifically grants permission.
The advanced encryption standard (AES) symmetric encryption method and the Rivest-Shamir Adleman (RSA) asymmetric encryption method are among the suggested approaches.
Users who want to receive messages in the symmetric encryption process must exchange a special, unique key.
On the other hand, asymmetric encryption encrypts and decrypts communications as they are being sent using both a private key and a public key.
Then, a viability analysis is carried out for the two encryption algorithms previously mentioned, which are responsible for protecting the confidentiality and integrity of the data related to the other techniques.
Related Results
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
“Cloud Computing – Navigating the Digital Sky” is an extensive guide designed to provide a thorough understanding of cloud computing, an essential technology in today’s digital age...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
Piece by piece: Collaborative mosaic-making for inclusive policy development
Piece by piece: Collaborative mosaic-making for inclusive policy development
This report sets out the findings from one of four projects commissioned by Wellcome Policy Lab to pilot creative approaches to policy development. In this project, Scientia Script...
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
Cloud computing refers to the continuous availability of computer infrastructure technology, enabling the handling and storage of information without direct client management. Peop...
Cybersecurity on a budget: Affordable cloud security tools for SMBs
Cybersecurity on a budget: Affordable cloud security tools for SMBs
Small and medium-sized businesses (SMBs) are increasingly targeted by cyber threats due to their growing digital presence, valuable data assets, and often limited security infrastr...
Assessing Security with Regard to Cloud Applications in STEM Education
Assessing Security with Regard to Cloud Applications in STEM Education
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to m...
Responsibilised Resilience? Reworking Neoliberal Social Policy Texts
Responsibilised Resilience? Reworking Neoliberal Social Policy Texts
Introduction This essay begins with the premise that resilience, broadly defined as positive adaptation despite adversity (Garmezy and Rutter), and resilience building are importa...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...

