Improved Key Management Technique in Cloud Data Storage Using Cyclic Shift Cryptography

Download Now
Provided by: International Journal of Scientific Progress & Research (IJSPR)
Topic: Cloud
Format: PDF
Key generation and key authentication provide a security facility for storage a data over cloud network. The data storage over cloud network process involved multiple servers and required multiple key authentication process. The multiple key authentication process degraded the performance of cloud network. And the process of key generation and key authentication take more time and invites man in middle attack and cloud data threat by third party. Security in cloud computing can be addressed in many facets viz. authentication, integrity, confidentiality etc. Data integrity or correctness, one of most challenging aspects in cloud computing, is the issue related to cloud user's worry about alteration/deletion in the user data stored remotely.
Download Now

Find By Topic