Abstract
Protecting cloud data from security breaches, preventing and ensuring safe cloud data is concealed from unauthorized access or infiltration by unwanted users are all part of cloud infrastructure security. This proposed technique is based on ensuring data confidentiality by adding extra-layer of security from the client side, developing a framework that implements the AES 256-bit key and Fernet 128-bits algorithms, which encrypt and decrypt files via random algorithm selection during uploads and downloads. When a file is uploaded to the cloud, the decryption key is recorded in the local server's file log. The software use randomized algorithm selection to provide security to ensure that an attacker having a prior link cannot reset the user account since the attacker cannot guess the token. Furthermore, invalidating this token ensures that the link cannot be used more than once if it was previously logged anywhere. To propose and verify the efficiency of the model the results generated(in quantitative values) are frequency (monobit) testing, with a minimum bit size of 64, given the P-values derived from the above study (i.e., 0.8838, 0.6187, 0.3768, 0.2817, 0.5843, 0.4167). The findings reveal throughput for encryption of 0.91531 and for decryption of 0.4854, space complexity of 0.4854, and entropy of 7.942616667.This research work studies the design of a robust, adaptable, and non-deterministic SaaS application that can be secure for enterprises and subsequent research studies will be conducted in the development.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Research in Computer Science
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.