Abstract
The security issues in the cloud have been well studied. The data security has much importance in point of data owner. There are number of approaches presented earlier towards performance in data security in cloud. To overcome the issues, a class based multi stage encryption algorithm is presented in this paper. The method classifies the data into number of classes and different encryption scheme is used for different classes in different levels. Similarly, the user has been authenticated for their access and they have been classified into different categories. According to the user profile, the method restricts the access of user and based on the same, the method defines security measures. A system defined encryption methodology is used for encrypting the data. Moreover, the user has been returned with other encryption methods which can be decrypted by the user using their own key provided by the system. The proposed algorithm improves the performance of security and improves the data security.
Highlights
The data security is the process of restricting theThe growing size of data owned by different illegal access from malformed user
The system would verify the access of user and provide the data organizations are not able to spend for the huge data base
There are number of encryption schemes available like their information in the cloud based on service level public/private key encryption
Summary
The data security is the process of restricting theThe growing size of data owned by different illegal access from malformed user. Not all the attribute based encryption has been used in the data can be accessed by the users of the organization and several articles but introduces higher time complexity. Each stage of data class has different key restrict them according to the class is a highly challenging for encryption decryption. By categorizing the data into number of class and by further encrypted using the system key before storing.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Computer Communication and Informatics
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.