TY - GEN
T1 - Analysis of execution time for encryption during data integrity check in cloud environment
AU - Akshay, K. C.
AU - Muniyal, Balachandra
PY - 2019/1/1
Y1 - 2019/1/1
N2 - Cloud computing is one of the latest and encouraging solutions to the increasing demand for using and accessing the resources endowed over the internet. It has significantly emerged as a standard for deploying services, applications for both end-users and enterprises. It offers powerful processing and storage resources as on-demand services with reduced cost, increased efficiency and performance. All these features promote enterprises, critical infrastructure providers and even government projects or applications to drift towards the cloud. In recent years, for all the fast growing segments of Information Technology industry, cloud computing has grown as a promising business concept. However, issues begin to grow on cloud as vast amount of information of individuals and organizations are stored on cloud, which raise a question about cloud environment providing stability, reliability and safety. With many well provisioned, well adapted promising facilities and benefits, there are still a number of technical obstacles such as security and quality of service which hinder the proper utilization of the cloud. In this regard, a possible solution is proposed to provide high level confidentiality by preserving the data integrity. An analysis is performed for the proposed method to verify the repeatability in the encryption process in given environment.
AB - Cloud computing is one of the latest and encouraging solutions to the increasing demand for using and accessing the resources endowed over the internet. It has significantly emerged as a standard for deploying services, applications for both end-users and enterprises. It offers powerful processing and storage resources as on-demand services with reduced cost, increased efficiency and performance. All these features promote enterprises, critical infrastructure providers and even government projects or applications to drift towards the cloud. In recent years, for all the fast growing segments of Information Technology industry, cloud computing has grown as a promising business concept. However, issues begin to grow on cloud as vast amount of information of individuals and organizations are stored on cloud, which raise a question about cloud environment providing stability, reliability and safety. With many well provisioned, well adapted promising facilities and benefits, there are still a number of technical obstacles such as security and quality of service which hinder the proper utilization of the cloud. In this regard, a possible solution is proposed to provide high level confidentiality by preserving the data integrity. An analysis is performed for the proposed method to verify the repeatability in the encryption process in given environment.
UR - http://www.scopus.com/inward/record.url?scp=85061115256&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85061115256&partnerID=8YFLogxK
U2 - 10.1007/978-981-13-5826-5_48
DO - 10.1007/978-981-13-5826-5_48
M3 - Conference contribution
AN - SCOPUS:85061115256
SN - 9789811358258
T3 - Communications in Computer and Information Science
SP - 617
EP - 627
BT - Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers
A2 - Thampi, Sabu M.
A2 - Rawat, Danda B.
A2 - Alcaraz Calero, Jose M.
A2 - Madria, Sanjay
A2 - Wang, Guojun
PB - Springer Verlag
T2 - 6th International Symposium on Security in Computing and Communications, SSCC 2018
Y2 - 19 September 2018 through 22 September 2018
ER -