• Login
    • University Home
    • Library Home
    • Lib Catalogue
    • Advance Search
    View Item 
    •   KDU-Repository Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2022 IRC Articles
    • Technology
    • View Item
    •   KDU-Repository Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2022 IRC Articles
    • Technology
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Secure Data Transformation in Cloud Using Hybrid Cryptography

    Thumbnail
    View/Open
    9 Secure Data Transformation in Cloud Using Hybrid Cryptography.pdf (235.7Kb)
    Date
    2022-09
    Author
    Hansika, EBT
    Upeksha, RGC
    Weerawardane, T
    Metadata
    Show full item record
    Abstract
    The cloud is a very well-known and accepted data storage that provides many benefits to users with a pay-as-you-go pricing model, even providing storage solutions for massive amounts of data. Many users nowadays use different cloud services, mainly because the data can be accessed from anywhere via the internet. The cloud servers are located all over the world storing massive amounts of data. When a user uploads or downloads from the cloud server, the data is exposed to the internet. This can lead to security issues such as unauthorized disclosure of data and the privacy of users if the data is not properly protected. Many cryptographic algorithms are used to secure data transformation in the cloud. The proposed system is designed to offer a method for properly securing data when transferring them to the cloud, utilizing various cryptographic techniques, and integrating them most innovatively and effectively considering the security, data integrity, speed, and data confidentiality. The data is encrypted using a combination of three algorithms namely AES, ECC, and RSA by increasing the security of the data. The keys generated by the ECC and RSA are combined using an Exclusive OR gate. The AES key is uploaded into the key management server after being encrypted by the newly generated key. The data encrypted by the AES key are uploaded into the cloud storage. The proposed system is intended to distinguish the features and functionalities to overcome the drawbacks of the current systems.
    URI
    http://ir.kdu.ac.lk/handle/345/6506
    Collections
    • Technology [10]

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback
     

     

    Browse

    All of KDU RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsFacultyDocument TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsFacultyDocument Type

    My Account

    LoginRegister

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback