U. N. V. P. Rajendranath, Ngangbam Phalguni Singh, B. Manimaran, V. Mohanavel, K. Dhivya
{"title":"云计算环境下保持数据完整性的鲁棒信息安全模型","authors":"U. N. V. P. Rajendranath, Ngangbam Phalguni Singh, B. Manimaran, V. Mohanavel, K. Dhivya","doi":"10.1109/ICEARS53579.2022.9752082","DOIUrl":null,"url":null,"abstract":"With the fast growth of cloud computing, more and more clients want to store their data on PCS (public cloud servers). More clients will benefit from using the public cloud if new security issues can be addressed. PCS's proxy will process the client's data and upload it if he is unable to access PCS. Data storage on remote servers must be protected, and cloud computing is a major factors in determining how this might be done. The data owners and users may rest certain that their data is safe and secure thanks to the usage of authentication and authorization mechanisms. A New proof assisted trustworthy data management method, which enables owners of data to send the information into server using Modified Cryptographic Standards MCS, RSA and others. These systems allow the data owner and the data users to keep and retrieve the data to and from the server successfully. Secure cloud computing methods preserve data on a distant server with suitable permission and authentication systems, as well as providing trust-based services to its customers with the highest level of security.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Robust Information Security Model to Preserve Data Integrity in Cloud Computing Environment\",\"authors\":\"U. N. V. P. Rajendranath, Ngangbam Phalguni Singh, B. Manimaran, V. Mohanavel, K. Dhivya\",\"doi\":\"10.1109/ICEARS53579.2022.9752082\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the fast growth of cloud computing, more and more clients want to store their data on PCS (public cloud servers). More clients will benefit from using the public cloud if new security issues can be addressed. PCS's proxy will process the client's data and upload it if he is unable to access PCS. Data storage on remote servers must be protected, and cloud computing is a major factors in determining how this might be done. The data owners and users may rest certain that their data is safe and secure thanks to the usage of authentication and authorization mechanisms. A New proof assisted trustworthy data management method, which enables owners of data to send the information into server using Modified Cryptographic Standards MCS, RSA and others. These systems allow the data owner and the data users to keep and retrieve the data to and from the server successfully. Secure cloud computing methods preserve data on a distant server with suitable permission and authentication systems, as well as providing trust-based services to its customers with the highest level of security.\",\"PeriodicalId\":252961,\"journal\":{\"name\":\"2022 International Conference on Electronics and Renewable Systems (ICEARS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Electronics and Renewable Systems (ICEARS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEARS53579.2022.9752082\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS53579.2022.9752082","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Robust Information Security Model to Preserve Data Integrity in Cloud Computing Environment
With the fast growth of cloud computing, more and more clients want to store their data on PCS (public cloud servers). More clients will benefit from using the public cloud if new security issues can be addressed. PCS's proxy will process the client's data and upload it if he is unable to access PCS. Data storage on remote servers must be protected, and cloud computing is a major factors in determining how this might be done. The data owners and users may rest certain that their data is safe and secure thanks to the usage of authentication and authorization mechanisms. A New proof assisted trustworthy data management method, which enables owners of data to send the information into server using Modified Cryptographic Standards MCS, RSA and others. These systems allow the data owner and the data users to keep and retrieve the data to and from the server successfully. Secure cloud computing methods preserve data on a distant server with suitable permission and authentication systems, as well as providing trust-based services to its customers with the highest level of security.