Hybrid Chaining Security Approach in Cloud Computing

Lecture Notes in Electrical EngineeringOptical and Wireless Technologies(2020)

引用 1|浏览0
暂无评分
摘要
In the innovative world, the advance progression of information in cloud computing has become the concern since information is the most significant asset which needs to be secure. Several encryption techniques are broadly available and used in information security across all platforms. Encryption algorithms are arranged into two major groups: symmetric key and asymmetric key. Asymmetric-key encryption is utilized close by symmetric-key encryption to develop the best execution of information exchange. Numerous analysts have proposed different encryption calculations, for example, AES, DES, Blowfish, and so forth. However, as security level is expanding, the time and multifaceted nature of calculation are additionally expanding. This is the significant reason for diminishing the speed and proficiency of the encryption framework, and cloud computing is growing expertise that is vague to several security issues. The proposed scheme is based on hybridization of RSA and AES, encryption algorithm, i.e., “Hybrid Chaining Algorithm (HCA)” which upgrades the security execution. The HCA is a blend of open private (AES and RSA) key encryption algorithm that utilizes 128–1024 bits key size and also uses MD5 hashing procedure to expand the security. This calculation utilizes MD5 hashing procedure to expand the security. The fundamental focal point of this framework is to hinder data access from cloud information stockpiling centers by unapproved clients. This superbly put away data at cloud information stockpiling centers and recovers information from it once it is required. This gives the highly secured state of information security for online virtual framework and spares the misrepresentation clients to utilize your insight.
更多
查看译文
关键词
AES, RSA, Hybrid chaining algorithm (HCA), MD5, Cloud computing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要