Journal article Open Access

Compositional Defence of Application Privacy in Resistant to Physical and Software Attacks in Untrusted Cloud Environment

Mitesh Chanodiya; Dr. Manish Potey


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://zenodo.org/record/5412507</identifier>
  <creators>
    <creator>
      <creatorName>Mitesh Chanodiya</creatorName>
      <affiliation>Department of Computer Engineering, K.J. Somaiya College of Engineering, Vidyavihar, Mumbai- 400077, India.</affiliation>
    </creator>
    <creator>
      <creatorName>Dr. Manish Potey</creatorName>
      <affiliation>Department of Computer Engineering, K.J. Somaiya College of Engineering, Vidyavihar, Mumbai- 400077, India.</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Compositional Defence of Application Privacy in Resistant to Physical and Software Attacks in Untrusted Cloud Environment</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2021</publicationYear>
  <subjects>
    <subject>Confidentiality, cryptography, data leakage, data security, integrity, IoT, protect the privacy.</subject>
    <subject subjectScheme="issn">2249-8958</subject>
    <subject subjectScheme="handle">100.1/ijeat.F30240810621</subject>
  </subjects>
  <contributors>
    <contributor contributorType="Sponsor">
      <contributorName>Blue Eyes Intelligence Engineering  and Sciences Publication (BEIESP)</contributorName>
      <affiliation>Publisher</affiliation>
    </contributor>
  </contributors>
  <dates>
    <date dateType="Issued">2021-08-30</date>
  </dates>
  <language>en</language>
  <resourceType resourceTypeGeneral="JournalArticle"/>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/5412507</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="ISSN" relationType="IsCitedBy" resourceTypeGeneral="JournalArticle">2249-8958</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.35940/ijeat.F3024.0810621</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;Cloud computing facilities have become an increasing rise in demand for presenting computing sources. Various programs like monetary transactions, fitness care systems, video streaming, IoT programs want on-call for provisioning of cloud sources to guarantee timeliness and excessive availability. A shared culture for data interchange has evolved as a result of the fast progress of networking technology. The data security has become a difficult issue as a result of the vast volume of data that is exchanged via the internet. Thus there is a requirement for security to protect data that is transmitted across an insecure connection. In our proposed work, privacy, confidentiality, availability, integrity, and accountability that contribute to the security of information are ensured by cryptographic technique. This paper also describes an exhaustive study on the usage of hybrid algorithms i.e. the combination of Advanced Encryption Standards (AES) and Elliptical Curve Cryptography (ECC) to protect data leakage and protect the privacy of end-users and SHA256 algorithm to ensure data integrity. This type of hybrid encryption will help not only in concentrating software as well as physical attacks but also provide the model to deal with and prevent the application from these types of attacks; thus making the cloud application system more secure. The implemented web application can be used as a defence system for privacy and security in organizations as well as institutions where members of the organization can share the file or confidential data to other team members or colleagues without data leakage thus providing data privacy and security.&amp;nbsp;&lt;/p&gt;</description>
  </descriptions>
</resource>
32
20
views
downloads
Views 32
Downloads 20
Data volume 13.8 MB
Unique views 27
Unique downloads 18

Share

Cite as