Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing
DOI:
https://doi.org/10.59461/ijdiic.v2i1.34Keywords:
Cloud Security , Encryption , Message authentication code , Virtualization , Secured socket layerAbstract
This paper discusses different techniques and specialized procedures which can be used to effectively protect data from the owner to the cloud and then to the user. The next step involves categorizing the data using three encryption parameters provided by the user, which are Integrity, Availability, and Confidentiality (IAC). The data is secured through various methods such as SSL and MAC protocols to ensure data integrity checks, searchable encryption, and splitting the data into three parts for cloud storage. Dividing the data into three portions not only enhances security but also facilitates easier access. Access to the encrypted data requires the user to provide the login information and password of the owner. This paper also studies critical security issues like unauthorized servers, brute force attacks, threats from cloud service providers, and loss of user identity and password.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Kofi Immanuel Jones, R. Suchithra
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.