首页> 外文会议>2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare >Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption
【24h】

Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption

机译:增强的云安全框架,用于通过非对称和对称密钥加密来确认数据安全性

获取原文
获取原文并翻译 | 示例

摘要

Cloud is a modern business sharing data or information with great effectiveness of infrastructures it plays a major role in world wide. As in the information technology sector defines cloud security is the evolving sub domain of computer security and information security. Here the organization uses the cloud as a many service model (Saas, Pass and Iass)and deployment model (private, public, hybrid and community). In this type of model the responsibilities more for secure the information of the customer, So the organization ensures the different way to monitor and secure the data and information from hacking. They offer suspicious activity for their customer data by enhancing the data with encryption and decryption. Encryption makes the access method of proving the original data to be duplicated form and then the client can also be constructed with the proper decryption of the data to prevent the information from eavesdroppers from accessing Symmetric keys encryption or secret key encryption. The Key should be distributed before transmission between entities, then key play vital role for security. DES is In Asymmetric key encryption or public key encryption on that private and public keys are used in the encryption level on cloud. The Public key is used for encrypting the file and private key is used to decrypt the file. Because user tends to use two keys public this is known to public and private who is known to the user a type of algorithm such as RSA. Here we analysis the document is encrypted and then which efficient in that way of approach.
机译:云是共享数据或信息的现代业务,具有强大的基础架构,它在全球范围内发挥着重要作用。正如在信息技术领域中定义的那样,云安全性是计算机安全性和信息安全性的不断发展的子领域。在这里,组织使用云作为多种服务模型(Saas,Pass和Iass)和部署模型(私有,公共,混合和社区)。在这种类型的模型中,更多的责任是确保客户信息的安全,因此组织确保以不同的方式监视和保护数据和信息免遭黑客入侵。他们通过加密和解密增强数据,从而为其客户数据提供可疑活动。加密使访问方法能够证明原始数据是重复的形式,然后也可以通过对数据进行适当的解密来构造客户端,以防止窃听者的信息访问对称密钥加密或秘密密钥加密。密钥应在实体之间传输之前分配,然后密钥对安全起着至关重要的作用。 DES处于非对称密钥加密或公共密钥加密中,私有和公共密钥用于云上的加密级别。公钥用于加密文件,而私钥用于解密文件。因为用户倾向于使用两个公用密钥,所以公用密钥和专用密钥都是用户已知的,而公用密钥则是用户已知的一种算法,例如RSA。在这里,我们分析文档是加密的,然后以这种方式有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号