Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/220069
Title: Efficient Data Outsourcing Using Hybrid Key Generation Scheme in Cloud Computing
Researcher: Chaudhary, Sumit
Guide(s): Joshi, N.K. and Diwakar, M.
Keywords: Data Outsourcing
Decryption
Encryption
Engineering and Technology
Hybrid Key Generation
University: Uttaranchal University
Completed Date: 2018
Abstract: Cloud data outsourcing is all about services over the internet when we access the services, security is a major concern. The main aspect in the use of any cloud services is data security, confidentiality, and integrity. As far as security is a concern, data encryption is one way to protect our data before outsourcing. With the combination of a convenient asymmetric and symmetric encryption scheme, strategy is developed. Using hybrid key generation scheme data transfer can be done and secure encryption is achieved. For the decryption algorithm the user s public key is required and applied in digital signature algorithm. As soon as recovery of symmetric key is complete, it is ready to use for decrypting the message. newlineVarious benefits can be provided by using combination of encryption methods. Connection can be established between among two users with the improved encryption technique and that will be more secured. Communication can be done between users with this hybrid key Algorithm. Thus in the data encryption or decryption, key management is also the challenging issue. newlineOver the network, data security and its network play an important role. The foremost concern while transmitting the data over the network is its security.This thesis explains a security algorithm for cloud through which data can be secure over the datacenter.To make data secure one of the advanced method is there which known as Blend technique. A combination of three existing algorithms i.e. AES, RSA and digital signature been elaborated in this thesis.Using here two algorithms AES and RSA a private key generated where AES denotes a symmetric and RSA an asymmetric cryptographic algorithm. After getting result of a private key, digital signature is used and that generated private key is applied to digital signature that helps in providing authentication and authorization to the system. After the whole process is done then the verification phase begins by using the 1024 bits public key of RSA algorithm. newline
Pagination: xiii;100
URI: http://hdl.handle.net/10603/220069
Appears in Departments:Faculty of Uttaranchal Institute of Technology - Computer Science Engineering

Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: