Cloud Data Security using Authentication and Encryption Technique
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centres. This mechanism brings about many new challenges, which have not been well understood. Security and privacy concerns, however, are among the top concerns standing in the way of wider adoption of cloud. In cloud computing the main concern is to provide the security to end user to protect files or data from unauthorized user. Security is the main intention of any technology through which unauthorized intruder can't access your file or data in cloud. We have designed one proposed design and architecture that can help to encrypt and decrypt the file at the user side that provide security to data at rest as well as while moving. In this research paper, we have used the Rijndael Encryption Algorithm along with EAP-CHAP
Authors and Affiliations
Sanjoli Singla , Jasmeet Singh
Use of Open Source Software in Engineering
The term Open Source Software (OSS) is widely described with the software that is available with its source code and a licensed to redevelop and redistributes it. Todays open source softwares are widely used for ev...
Evaluating the Performance and Delay in Unstructured Peer to Peer Networks
Peer-to-Peer computing has become a popular networking paradigm for file sharing, distributed computing, collaborative working, etc. The widely used unstructured Peer to Peer protocols mainly face problems affectin...
Restricting mischievous users in anonymizing networks
Anonymizing networks such as knoll tolerate users to admittance Internet services clandestinely by using a progression of routers to bury the client’s IP address from the server. The achievement of such networks,...
Secure Re-encryption in Unreliable Cloud using Synchronous clock
In this Paper With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. To keep the shared data confidential against untrusted cloud service provi...
Implementation of Soft Handover in IEEE 802.16e
The demand for high data rates is increasing day by day, so to fulfill this requirement a new technology is introduced named WiMAX IEEE 802.16e standard. IEEE 802.16e standard is the enhanced version of IEEE 802.16 stand...