Cloud Data Security using Authentication and Encryption Technique

Article ID

CSTB7NQQD

Cloud Data Security using Authentication and Encryption Technique

Sanjoli Singla
Sanjoli Singla RIMT-IET, Mandi Gobindgarh/ Punjab Techincal University
Jasmeet Singh
Jasmeet Singh
DOI

Abstract

Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centers. This mechanism brings about many new challenges, which have not been well understood. Security and privacy concerns, however, are among the top concerns standing in the way of wider adoption of cloud. In cloud computing the main concern is to provide the security to end user to protect files or data from unauthorized user. Security is the main intention of any technology through which unauthorized intruder can’t access your file or data in cloud. We have designed one proposed design and architecture that can help to encrypt and decrypt the file at the user side that provide security to data at rest as well as while moving. In this research paper, we have used the Rijndael Encryption Algorithm along with EAP-CHAP.

Cloud Data Security using Authentication and Encryption Technique

Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centers. This mechanism brings about many new challenges, which have not been well understood. Security and privacy concerns, however, are among the top concerns standing in the way of wider adoption of cloud. In cloud computing the main concern is to provide the security to end user to protect files or data from unauthorized user. Security is the main intention of any technology through which unauthorized intruder can’t access your file or data in cloud. We have designed one proposed design and architecture that can help to encrypt and decrypt the file at the user side that provide security to data at rest as well as while moving. In this research paper, we have used the Rijndael Encryption Algorithm along with EAP-CHAP.

Sanjoli Singla
Sanjoli Singla RIMT-IET, Mandi Gobindgarh/ Punjab Techincal University
Jasmeet Singh
Jasmeet Singh

No Figures found in article.

Sanjoli Singla. 2013. “. Global Journal of Computer Science and Technology – B: Cloud & Distributed GJCST-B Volume 13 (GJCST Volume 13 Issue B3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 13 Issue B3
Pg. 31- 35
Classification
Not Found
Article Matrices
Total Views: 9169
Total Downloads: 2300
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Cloud Data Security using Authentication and Encryption Technique

Sanjoli Singla
Sanjoli Singla RIMT-IET, Mandi Gobindgarh/ Punjab Techincal University
Jasmeet Singh
Jasmeet Singh

Research Journals