Published March 24, 2023 | Version v1
Journal article Open

Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing

  • 1. Department Computer Science and Information Technology, Jain University, Bengaluru, Karnataka, India

Description

This paper discusses different techniques and specialized procedures which can be used to effectively protect data from the owner to the cloud and then to the user. The next step involves categorizing the data using three encryption parameters provided by the user, which are Integrity, Availability, and Confidentiality (IAC). The data is secured through various methods such as SSL and MAC protocols to ensure data integrity checks, searchable encryption, and splitting the data into three parts for cloud storage. Dividing the data into three portions not only enhances security but also facilitates easier access. Access to the encrypted data requires the user to provide the login information and password of the owner. This paper also studies critical security issues like unauthorized servers, brute force attacks, threats from cloud service providers, and loss of user identity and password.

Files

ijdiic_v2n1a2.pdf

Files (1.3 MB)

Name Size Download all
md5:4392ccf5d80735d106924ea98f76ab7b
1.3 MB Preview Download