Self-evident rapid and scalable fortification encryption with data access organise in multiuser cloud environments Online publication date: Sun, 14-May-2023
by Mohan Nagamunthala; R. Manjula
International Journal of Cloud Computing (IJCC), Vol. 12, No. 2/3/4, 2023
Abstract: Increasing internet connectivity transforms the small business owners to the large business dealers. Here the cloud storage is a platform for transforming the data between the owners and their clients. This data transformation leads a way to data redundancy and data loss. So there is a need for the secure data transmission and the deduplication in cloud storage. To handle the situation cloud storage providers offers cloud encryption technique. The proposed works apply the encryption technique between the cloud owners and clients. A novel design of auditor section controls the data integrity with security for the cloud owners and multiple cloud clients. The auditor integrity model controls the data upload activity among the clients and the cloud servers. It generates the ownership proof among the cloud owners. The proposed work can eliminate the multiple clients to save the same data copy in the cloud server. The elimination improves the proper utilisation of cloud storage resource. Encryption techniques performed on hybrid block cipher algorithms like the triple DES, Blowfish increases the security analysed over the Java software.
Online publication date: Sun, 14-May-2023
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Cloud Computing (IJCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com