Abstract
The numerous technologies and procedures used to safeguard private cloud infrastructure are private cloud security. Despite multitenant public cloud environments, resources are dedicated to individual companies in a private cloud. Cloud computing uses several data security mechanisms, including authentication and identification, access control, encryption, secure deletion, integrity checking, and data masking. Cloud computing relies heavily on security and traffic management. Because data must be transferred from a local computer to a remote computer when using a cloud computing service, data protection is becoming an increasingly important security problem. Research on cloud computing-based secure dynamic bit standard (CC-SDBS) technology has increased data security. This technique’s cryptographic algorithms (CA) improve cloud computing security. As a result of the private cloud security level algorithm (PCSLA), the client’s private data can be easily accessed in the cloud. For the client’s private cloud data, PCSLA provides dynamic security measures. Cloud computing applications can use the tests’ better data security in the future. The proposed algorithm’s testing results have shown a noticeable improvement in cipher size and execution time compared with other commonly used cloud computing. Numerical results revealed that CC-SDBS improved average energy consumption by 20%, average network latency by 25%, average key generation time analysis by 4.3%, and average network use by 15%.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.