云计算环境下保持数据完整性的鲁棒信息安全模型

U. N. V. P. Rajendranath, Ngangbam Phalguni Singh, B. Manimaran, V. Mohanavel, K. Dhivya
{"title":"云计算环境下保持数据完整性的鲁棒信息安全模型","authors":"U. N. V. P. Rajendranath, Ngangbam Phalguni Singh, B. Manimaran, V. Mohanavel, K. Dhivya","doi":"10.1109/ICEARS53579.2022.9752082","DOIUrl":null,"url":null,"abstract":"With the fast growth of cloud computing, more and more clients want to store their data on PCS (public cloud servers). More clients will benefit from using the public cloud if new security issues can be addressed. PCS's proxy will process the client's data and upload it if he is unable to access PCS. Data storage on remote servers must be protected, and cloud computing is a major factors in determining how this might be done. The data owners and users may rest certain that their data is safe and secure thanks to the usage of authentication and authorization mechanisms. A New proof assisted trustworthy data management method, which enables owners of data to send the information into server using Modified Cryptographic Standards MCS, RSA and others. These systems allow the data owner and the data users to keep and retrieve the data to and from the server successfully. Secure cloud computing methods preserve data on a distant server with suitable permission and authentication systems, as well as providing trust-based services to its customers with the highest level of security.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Robust Information Security Model to Preserve Data Integrity in Cloud Computing Environment\",\"authors\":\"U. N. V. P. Rajendranath, Ngangbam Phalguni Singh, B. Manimaran, V. Mohanavel, K. Dhivya\",\"doi\":\"10.1109/ICEARS53579.2022.9752082\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the fast growth of cloud computing, more and more clients want to store their data on PCS (public cloud servers). More clients will benefit from using the public cloud if new security issues can be addressed. PCS's proxy will process the client's data and upload it if he is unable to access PCS. Data storage on remote servers must be protected, and cloud computing is a major factors in determining how this might be done. The data owners and users may rest certain that their data is safe and secure thanks to the usage of authentication and authorization mechanisms. A New proof assisted trustworthy data management method, which enables owners of data to send the information into server using Modified Cryptographic Standards MCS, RSA and others. These systems allow the data owner and the data users to keep and retrieve the data to and from the server successfully. Secure cloud computing methods preserve data on a distant server with suitable permission and authentication systems, as well as providing trust-based services to its customers with the highest level of security.\",\"PeriodicalId\":252961,\"journal\":{\"name\":\"2022 International Conference on Electronics and Renewable Systems (ICEARS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Electronics and Renewable Systems (ICEARS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEARS53579.2022.9752082\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS53579.2022.9752082","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着云计算的快速发展,越来越多的客户希望将数据存储在pc(公有云服务器)上。如果新的安全问题能够得到解决,更多的客户将从使用公共云中受益。如果客户无法访问PCS, PCS的代理将处理客户的数据并上传。远程服务器上的数据存储必须受到保护,而云计算是决定如何做到这一点的一个主要因素。由于使用了身份验证和授权机制,数据所有者和用户可以确信他们的数据是安全可靠的。一种新的证明辅助可信数据管理方法,使数据所有者能够使用修改密码标准MCS、RSA等将信息发送到服务器。这些系统允许数据所有者和数据用户成功地在服务器中保存和检索数据。安全的云计算方法通过适当的权限和认证系统将数据保存在远程服务器上,并以最高的安全性为客户提供基于信任的服务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Robust Information Security Model to Preserve Data Integrity in Cloud Computing Environment
With the fast growth of cloud computing, more and more clients want to store their data on PCS (public cloud servers). More clients will benefit from using the public cloud if new security issues can be addressed. PCS's proxy will process the client's data and upload it if he is unable to access PCS. Data storage on remote servers must be protected, and cloud computing is a major factors in determining how this might be done. The data owners and users may rest certain that their data is safe and secure thanks to the usage of authentication and authorization mechanisms. A New proof assisted trustworthy data management method, which enables owners of data to send the information into server using Modified Cryptographic Standards MCS, RSA and others. These systems allow the data owner and the data users to keep and retrieve the data to and from the server successfully. Secure cloud computing methods preserve data on a distant server with suitable permission and authentication systems, as well as providing trust-based services to its customers with the highest level of security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Solar Tracker Using Micro-controller "Core Strength" of Dance Lala Training Considering the Body Motion Tracking Video and Predictive Model Textile Antenna –Structure, Material and Applications Automated Classification of Atherosclerosis in Coronary Computed Tomography Angiography Images Based on Radiomics Study Using Automatic Machine Learning Cryptocurrency Exchange Rate Prediction using ARIMA Model on Real Time Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1