Improved Key Management Technique in Cloud Data Storage Using Cyclic Shift Cryptography

Key generation and key authentication provide a security facility for storage a data over cloud network. The data storage over cloud network process involved multiple servers and required multiple key authentication process. The multiple key authentication process degraded the performance of cloud network. And the process of key generation and key authentication take more time and invites man in middle attack and cloud data threat by third party. Security in cloud computing can be addressed in many facets viz. authentication, integrity, confidentiality etc. Data integrity or correctness, one of most challenging aspects in cloud computing, is the issue related to cloud user’s worry about alteration/deletion in the user data stored remotely.

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Resource Details

Provided by:
International Journal of Scientific Progress & Research (IJSPR)
Topic:
Cloud
Format:
PDF