Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/220069
Title: | Efficient Data Outsourcing Using Hybrid Key Generation Scheme in Cloud Computing |
Researcher: | Chaudhary, Sumit |
Guide(s): | Joshi, N.K. and Diwakar, M. |
Keywords: | Data Outsourcing Decryption Encryption Engineering and Technology Hybrid Key Generation |
University: | Uttaranchal University |
Completed Date: | 2018 |
Abstract: | Cloud data outsourcing is all about services over the internet when we access the services, security is a major concern. The main aspect in the use of any cloud services is data security, confidentiality, and integrity. As far as security is a concern, data encryption is one way to protect our data before outsourcing. With the combination of a convenient asymmetric and symmetric encryption scheme, strategy is developed. Using hybrid key generation scheme data transfer can be done and secure encryption is achieved. For the decryption algorithm the user s public key is required and applied in digital signature algorithm. As soon as recovery of symmetric key is complete, it is ready to use for decrypting the message. newlineVarious benefits can be provided by using combination of encryption methods. Connection can be established between among two users with the improved encryption technique and that will be more secured. Communication can be done between users with this hybrid key Algorithm. Thus in the data encryption or decryption, key management is also the challenging issue. newlineOver the network, data security and its network play an important role. The foremost concern while transmitting the data over the network is its security.This thesis explains a security algorithm for cloud through which data can be secure over the datacenter.To make data secure one of the advanced method is there which known as Blend technique. A combination of three existing algorithms i.e. AES, RSA and digital signature been elaborated in this thesis.Using here two algorithms AES and RSA a private key generated where AES denotes a symmetric and RSA an asymmetric cryptographic algorithm. After getting result of a private key, digital signature is used and that generated private key is applied to digital signature that helps in providing authentication and authorization to the system. After the whole process is done then the verification phase begins by using the 1024 bits public key of RSA algorithm. newline |
Pagination: | xiii;100 |
URI: | http://hdl.handle.net/10603/220069 |
Appears in Departments: | Faculty of Uttaranchal Institute of Technology - Computer Science Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title page.pdf | Attached File | 165.21 kB | Adobe PDF | View/Open |
02_certificate.pdf | 259.3 kB | Adobe PDF | View/Open | |
03_declaration.pdf | 228.5 kB | Adobe PDF | View/Open | |
04 _preface.pdf | 768.28 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 201.87 kB | Adobe PDF | View/Open | |
06_list of figure.pdf | 180.6 kB | Adobe PDF | View/Open | |
07_chapter 1_introduction.pdf | 664.97 kB | Adobe PDF | View/Open | |
08_chapter 2_background.pdf | 374.58 kB | Adobe PDF | View/Open | |
09_chapter 3_research methodology.pdf | 652.67 kB | Adobe PDF | View/Open | |
10_chapter 4_literature review.pdf | 189.64 kB | Adobe PDF | View/Open | |
11_chapter 5_need of it company-cloud server.pdf | 299.66 kB | Adobe PDF | View/Open | |
12_chapter 6_risk assessment.pdf | 305.8 kB | Adobe PDF | View/Open | |
13_chapter 7_proposed work.pdf | 364.78 kB | Adobe PDF | View/Open | |
14_chapter 8_result.pdf | 772.26 kB | Adobe PDF | View/Open | |
15_chapter 9_conclusion and future scope.pdf | 374.21 kB | Adobe PDF | View/Open | |
16_references_bibliography.pdf | 324.42 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: