Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 371

Informative Article | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.2 / 10


     

Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud

Nikhitha K. Nair, Navin K. S.


Abstract: Cloud computing in the domain of distributed systems introduces many challenges in the day-to-day life. One of the main challenges is data security and privacy. Security on cloud data can be enhanced using dual encryption. Different encryption techniques such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), Triple DES, Exclusive-OR (XOR), Rivest, Shamir and Adleman (RSA) are used for this purpose. The encryption techniques such as Exclusive-OR (XOR) and Advanced Encryption Standard (AES) can be used together to perform dual encryption on the cloud data. By utilizing cloud to re-sign the blocks that were previously signed by the revoked user on behalf of existing users, efficient user revocation can be performed. Auditing by the Third party auditor ensures the integrity of data stored in the cloud.


Keywords: Cloud computing, Dual encryption, User- Revocation, Third-party Auditing


Edition: Volume 4 Issue 4, April 2015


Pages: 1056 - 1059



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Nikhitha K. Nair, Navin K. S., "Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 1056-1059, https://www.ijsr.net/getabstract.php?paperid=SUB153030, DOI: https://www.doi.org/10.21275/SUB153030

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023

Pages: 273 - 278

Genetic based Task Scheduling Algorithms in Cloud Computing Environment

Dr. R. Kavitha, Kale Jyoti S.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 2966 - 2970

Security in Kubernetes: A Comprehensive Review of Best Practices

Dinesh Reddy Chittibala

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article
Top