Saumya Gupta
Vol. 2, Jan-Dec 2016
Page Number: 460-472
Abstract:
The centralized computing defines cloud computing as a centralized model that is responsible for providing the network access on-request basis to a shared pool of interconnected computation resources linked together. The same is done to a provision in a quick manner and to be released with minimal management effort or cloud provider interaction. It is a platform that is built to convenient customer interface with an IT framework. The promise made by cloud computing especially shared cloud, can be decked by security infraction, which is indefeasible. Encryption and decryption algorithms have been proposed to maintain the security of the private data that is being transmitted in the cloud scenario. The increasing necessity for the secure cloud storage being handled in a centralized fashion and thereby the enticing effects of the cryptography at client-side help us in prioritizing and combine them together, thereby naming an innovative mechanism for the private data as third-party security and regulation issues. The proposed work provides a more secure framework layer as security to the data, but still, various aspects need to be addressed in the future. Proposed work is suitable only for selected private data rather than a vast data input by the user on the cloud; we can extend this work for different types of modules with timestamp encryption converted time and efficiency in the future. In the future, the technique of Each Word Secure Authentication would be added to improve cloud security on behalf of private. Based on the security solutions, we will demonstrate a secure new client-side framework with advanced algorithm implementations in this article