Implementing Encryption and Decryption Algorithms for Data Security in Cloud Environments

Authors

  • Sophia Patel Department of Computer Science, University of California, Los Angeles, USA
  • Rajesh Kumar Department of Computer Science, University of Toronto, Canada

DOI:

https://doi.org/10.5281/zenodo.13850881%20

Keywords:

Decentralized KDCs, Access control, Cloud, ECC, Encryption, Decryption

Abstract

Data security refers to the method involved with safeguarding information from unapproved access and information corruption all through its lifecycle. Data security includes information encryption, hashing, tokenization, and key administration practices that protect information across all applications and stages. Cloud framework for getting to information with mysterious confirmation gives safer client verification, client revocation and prevents replay attacks. Access control is handled on cloud KDCs it is overall safer aimed at information encryption. Produced decentralized KDC's are then gathered by (KGC). Framework gives confirmation to the client, in which just framework approved clients can unscramble, view the put away data. Client approvals and access control plot is presented in cloud, which is important for hindering replay attacks and supports change of data set aside in the cloud. The entry control plot is procuring thought since just upheld clients should approach genuine examine. Our arrangement thwarts maintains creation, replay attacks, scrutinizing and adjust data set aside in the cloud. We in like manner address client disavowal. The issues of endorsement, access control, security affirmation should be handled simultaneously

Downloads

Published

2024-09-30

How to Cite

Patel, S., & Rajesh , K. (2024). Implementing Encryption and Decryption Algorithms for Data Security in Cloud Environments . Ayden Journal of Engineering and Applied Sciences, 12(2), 16–21. https://doi.org/10.5281/zenodo.13850881

Issue

Section

Articles