...
首页> 外文期刊>Journal of network and computer applications >A combined approach to ensure data security in cloud computing
【24h】

A combined approach to ensure data security in cloud computing

机译:确保云计算中数据安全的组合方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Cloud computing is a forthcoming revolution in information technology (IT) industry because of its performance, accessibility, low cost and many other luxuries. It is an approach to maximize the capacity or step up capabilities vigorously without investing in new infrastructure, nurturing new personnel or licensing new software. It provides gigantic storage for data and faster computing to customers over the internet. It essentially shifts the database and application software to the large data centers, i.e., cloud, where management of data and services may not be completely trustworthy. That is why companies are reluctant to deploy their business in the cloud even cloud computing offers a wide range of luxuries. Security of data in cloud is one of the major issues which acts as an obstacle in the implementation of cloud computing. In this paper, a frame work comprising of different techniques and specialized procedures is proposed that can efficiently protect the data from the beginning to the end, i.e., from the owner to the cloud and then to the user. We commence with the classification of data on the basis of three cryptographic parameters presented by the user, i.e., Confidentiality (C), Availability (A) and Integrity (l).The strategy followed to protect the data utilizes various measures such as the SSL (Secure Socket Layer) 128-bit encryption and can also be raised to 256-bit encryption if needed, MAC (Message Authentication Code) is used for integrity check of data, searchable encryption and division of data into three sections in cloud for storage. The division of data into three sections renders supplementary protection and simple access to the data. The user who wishes to access the data is required to provide the owner login identity and password, before admittance is given to the encrypted data in Section 1, Section 2, and Section 3.
机译:由于云计算的性能,可访问性,低成本和许多其他奢侈品,它是信息技术(IT)行业即将发生的革命。这是一种在不投资新基础架构,培养新人员或新软件许可的情况下,最大程度地提高容量或增强功能的方法。它通过互联网为客户提供了巨大的数据存储和更快的计算能力。它实际上将数据库和应用程序软件转移到大型数据中心,即云,其中数据和服务的管理可能不完全值得信赖。这就是为什么即使云计算提供了许多奢侈品,公司也不愿在云中部署其业务的原因。云中数据的安全性是阻碍云计算实施的主要问题之一。在本文中,提出了一种由不同技术和专门程序组成的框架,可以有效地从头到尾保护数据,即从所有者到云再到用户。我们首先根据用户提供的三个加密参数对数据进行分类,即机密性(C),可用性(A)和完整性(l)。为保护数据而采取的策略采用了多种措施,例如SSL (安全套接字层)128位加密,如果需要还可以提高到256位加密,MAC(消息身份验证代码)用于数据完整性检查,可搜索的加密以及将数据分为云中的三个部分进行存储。将数据分为三部分可提供补充保护和对数据的简单访问。希望访问数据的用户在提供第1节,第2节和第3节中的加密数据许可之前,必须提供所有者登录身份和密码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号