首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Implementation and management of cloud security for industry 4.O - data using hybrid elliptical curve cryptography
Institution:1. Department of Computer Science, College of Science and Humanities, SRM Institute of Science And Technology, Ramapuram, Chennai, Tamil Nadu, India;2. Department of Computer Applicatiobs, College of Science and Humanities, SRM Institute of Science And Technology, Ramapuram, Chennai, Tamil Nadu, India;1. Department of Basic Sciences and Humanities, GMR Institute of Technology, Rajam, Vizianagaram (Dist), Andhra Pradesh, India;2. Department of Humanities and Social Sciences, IIT Kharagpur, Khargagpur, India;3. Department of Mathematics, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences (SIMATS), Thandalam, Chennai, Tamilnadu, India;4. Department of ECE, Centurion University of Technology and Management, R. Sitapur, Paralakemund, Odisha, India;5. School of Electronics Engineering, VIT-AP University, Amaravathi, Andhra Pradesh, India;6. Department of CSE, Gokaraju Rangaraju Institute of Engineering & Technology, Bachupally, Hyderabad, Telangana, India;1. Functional Materials and Energy Devices Laboratory, Department of Physics and Nanotechnology, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Tamil Nadu 603 203, India;2. Nanotechnology Research Center, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Tamil Nadu 603 203, India;1. Department of Physics and Nanotechnology, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur 603203, Chengalpattu, India;2. Biomaterials Research laboratory, Department of Chemical Engineering, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur 603203, Chengalpattu, India;3. Research Centre for Carbon Solutions, Institute of Mechanical, Process and Energy Engineering, School of Engineering & Physical Sciences, Heriot-Watt University, Riccarton, UK;1. Department of ECE, Institute of Aeronautical Engineering, Hyderabad, India;2. Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, India;3. Department of CSE, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India;4. Department of EIE, VR Siddhartha Engg College, Vijayawada, India;5. Department of CSE, MLR Institute of Technology, Hyderabad, India;6. Department of ECE, Vishnu Institute of Technology, Bhimavaram, India
Abstract:Industry 4.0 places a premium on cloud security since more and more companies are moving their activities to the cloud to reap the benefits of the Fourth Industrial Revolution.The term “cloud computing” refers to a collection of Internet-based hardware and software tools. Providers of cloud services use data centers situated in various physical locations. Cloud computing makes life easier for users by making remote, simulated resources available over the internet. Google Apps and Microsoft SharePoint are two examples of popular cloud applications. In addition to its exciting potential, the “cloud computing” industry's lightning-fast expansion raises serious security concerns. When discussing security, cloud really suffers from Open Systems' and the internet's perennial problem. The only thing stopping the widespread use of cloud computing is the lack of trust in the system. There are a number of security concerns with cloud computing, including protecting user data and vetting cloud service providers' practices. Using encryption, confidential information can be sent over an unsecured channel without fear of data loss or manipulation. Data encryption using various protocols has been used in various settings. Different cryptosystems were developed and used at various times. Additionally, cloud computing enables multiple users to access and retrieve data simultaneously through their own personal Internet connections, which increases the risk of confidential data loss and exposure in a number of different places. Elliptic Curve Cryptography and other cryptographic algorithms have been used to develop numerous methods and protocols that guarantee the security and privacy of transmitted data. In this paper, we suggest a safe and efficient method for sharing information in the cloud without compromising its safety or integrity. The proposed system is able to guarantee authentication and data integrity because it uses a hybrid of the ECC and the Advanced Encryption Standard (AES) technique. The experimental results confirm the proposed approach outperforms the current gold standard.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号