Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 108

Informative Article | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud

Nikhitha K. Nair, Navin K. S.

Cloud computing in the domain of distributed systems introduces many challenges in the day-to-day life. One of the main challenges is data security and privacy. Security on cloud data can be enhanced using dual encryption. Different encryption techniques such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), Triple DES, Exclusive-OR (XOR), Rivest, Shamir and Adleman (RSA) are used for this purpose. The encryption techniques such as Exclusive-OR (XOR) and Advanced Encryption Standard (AES) can be used together to perform dual encryption on the cloud data. By utilizing cloud to re-sign the blocks that were previously signed by the revoked user on behalf of existing users, efficient user revocation can be performed. Auditing by the Third party auditor ensures the integrity of data stored in the cloud.

Keywords: Cloud computing, Dual encryption, User- Revocation, Third-party Auditing

Edition: Volume 4 Issue 4, April 2015

Pages: 1056 - 1059

Share this Article

How to Cite this Article?

Nikhitha K. Nair, Navin K. S., "Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153030, Volume 4 Issue 4, April 2015, 1056 - 1059

Enter Your Email Address




Similar Articles with Keyword 'Cloud computing'

Downloads: 180 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article



Top