A Novel Security Model for Strong Confidentiality and Authentication in Public Cloud Networks

Authors

  • Kuber Datt Gautam and Dr. Rajeev Vishwakarma

Keywords:

ECC, RC6, Hybrid Model, Cloud Computing, MD5.

Abstract

The invention of cloud computing is quite recent. Without the need for expensive hardware or software upgrades, it can increase potential. By enabling resource sharing across hardware, software, and platforms, it lowers the system's overall cost. Because to its broad use and practical usefulness, it is now considered essential in the current business environment. It is a desirable target for cybercriminals due to its enormous popularity and reliance on third parties. Security is one of the other aspects that affect service providers' ability to gain customers' trust and project a positive brand image. Due to the cloud's low cost and efficient infrastructure sharing, large businesses are transferring their services there more frequently. Safety must come first since there is so much data being kept remotely and because third parties are getting engaged. The capacity of numerous different security algorithms to safeguard sensitive data while consuming the least amount of system resources has been examined. In this study, data integrity is prioritized, and ECC and RC6 are taken into consideration as possible substitutes for ECC + RC6 and MD5. In general, the study offered an improved security system based on the ECC and RC6 algorithms and the Role-based Access Control Model. A public cloud application built with Java technology has been developed to verify the effectiveness of the suggested approach, and its computation time for various file sizes and formats has been examined.

Published

2023-04-07

How to Cite

Kuber Datt Gautam and Dr. Rajeev Vishwakarma. (2023). A Novel Security Model for Strong Confidentiality and Authentication in Public Cloud Networks. SJIS-P, 35(1), 850–858. Retrieved from http://sjis.scandinavian-iris.org/index.php/sjis/article/view/407

Issue

Section

Articles