Improving Cloud Security Using Multi Level Encryption and Authentication

Download Now
Provided by: International Journal of Innovative Research in Information Security (IJIRIS)
Topic: Security
Format: PDF
As people have become more social and electronically attached, the concern for information sharing over the internet still persists. As known many powerful cryptographical approaches have been proposed in the past which are practically impossible to break, yet there exists a major concern of total encryption and decryption time taken as a whole. It is a known fact that in encrypting a large chunk of data, traditional asymmetric key algorithm may be slower to symmetric key algorithm by 1000 times or more. Hence this paper proposes a hierarchical structure in which the parties are first authenticated, then exchange keys by asymmetric key algorithm, then do actual encryption and decryption by the symmetric key algorithm.
Download Now

Find By Topic