Vol. 3 Issue 2
Year: 2016
Issue:Feb-Apr
Title:Providing Security to The User Data in Cloud
Author Name:J.Nagaraja and M. Purushotham
Synopsis:
Cloud computing infrastructure is widely used for deploying client's data in sharing environment. Clients can store and retrieve their data, whenever client needs to access his data, cloud provides the required data efficiently. However, some of the important data might be easily damaged, where the data holder can't store in the cloud unless and until the data privacy and confidentiality is guaranteed. It is nice to provide confidentially during the query processing time and retrieval time. To provide confidentially and efficiency for the query processing, The authors use RC4 algorithm which provides security to users data. The RC4 algorithm produces a pseudo-random key stream that issued to generate the cipher text (by XORing it with the plaintext). With this stream cipher, it can be used for encryption by combining it with the plaintext using bit-wise exclusive-or; translate is performed in the same way.
Year: 2016
Issue:Feb-Apr
Title:Providing Security to The User Data in Cloud
Author Name:J.Nagaraja and M. Purushotham
Synopsis:
Cloud computing infrastructure is widely used for deploying client's data in sharing environment. Clients can store and retrieve their data, whenever client needs to access his data, cloud provides the required data efficiently. However, some of the important data might be easily damaged, where the data holder can't store in the cloud unless and until the data privacy and confidentiality is guaranteed. It is nice to provide confidentially during the query processing time and retrieval time. To provide confidentially and efficiency for the query processing, The authors use RC4 algorithm which provides security to users data. The RC4 algorithm produces a pseudo-random key stream that issued to generate the cipher text (by XORing it with the plaintext). With this stream cipher, it can be used for encryption by combining it with the plaintext using bit-wise exclusive-or; translate is performed in the same way.
No comments:
Post a Comment