giftvitamin.blogg.se

Sookasa boxcryptor
Sookasa boxcryptor










Mahmood GS, Huang DJ, Jaleel BA (2019) Achieving an effective, confidentiality and integrity of data in cloud computing. Sugumar R, Arul Marie Joyce K (2017) Ensure and secure data confidentiality in cloud computing environment using data obfuscation technique. Zakaria I, Mustapha H, Igarramen B (2019) A data confidentiality system based on trusted platform module in cloud storage environment. In: 2011 IEEE international conference on cloud computing and intelligence systems. Han S, Xing J (2011) Ensuring data storage security through a novel third party auditor scheme in cloud computing. In: 2016 IEEE/CIC international conference on communications in China (ICCC).

SOOKASA BOXCRYPTOR VERIFICATION

Ni J, Lin X, Zhang K, Yu Y, Shen XS (2016) Secure outsourced data transfer with integrity verification in cloud storage. In: 2014 47th Hawaii international conference on system sciences. F, Buckel T, Winkelmann A (2014) Cloud computing data protection-a literature review and analysis. UnfoldLabs (2017) 8 trends in cloud computing for 2018, Nov 2017.

sookasa boxcryptor

Magdalena K, Maria S (2018) Cloud computing-statistics on the use by enterprises. Kaur S, Kaur A (2015) Survey of security algorithms in cloud It should be noted that decryption consumes more resources than encryption. Performance analysis of the AES encryption algorithm was performed to compare execution time and memory usage during the encryption and decryption process. To verify the data integrity, we used the SHA 256 hash function with a two-level integrity check. We used the encryption technique (AES 256) to ensure the confidentiality of the data. To deal with data security concerns, we proposed a solution called Encrypt cloud that allows users to encrypt and check their files’ integrity before uploading and storing it the cloud storage. They do not provide users the control of the security of their data. Several works dealt with data security in the cloud, but most of these solutions largely depend on providers. With the number of attacks on the cloud and data leakage, users are worried about their data security in the cloud. However, data security is an increasing concern. Storing and backing up data in the cloud have become increasingly popular. Cloud services have seen a considerable increase in recent times, as the cloud allows users to outsource their data and IT resources.










Sookasa boxcryptor