Informative Article | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
Nikhitha K. Nair, Navin K. S.
Cloud computing in the domain of distributed systems introduces many challenges in the day-to-day life. One of the main challenges is data security and privacy. Security on cloud data can be enhanced using dual encryption. Different encryption techniques such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), Triple DES, Exclusive-OR (XOR), Rivest, Shamir and Adleman (RSA) are used for this purpose. The encryption techniques such as Exclusive-OR (XOR) and Advanced Encryption Standard (AES) can be used together to perform dual encryption on the cloud data. By utilizing cloud to re-sign the blocks that were previously signed by the revoked user on behalf of existing users, efficient user revocation can be performed. Auditing by the Third party auditor ensures the integrity of data stored in the cloud.
Keywords: Cloud computing, Dual encryption, User- Revocation, Third-party Auditing
Edition: Volume 4 Issue 4, April 2015
Pages: 1056 - 1059
How to Cite this Article?
Nikhitha K. Nair, Navin K. S., "Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153030, Volume 4 Issue 4, April 2015, 1056 - 1059
88 PDF Views | 80 PDF Downloads
Similar Articles with Keyword 'Cloud computing'
Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
Cloud Computing and Its Types in Mobile Network
Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Cloud Computing - A Birds Eye View