UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 9 | September 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 1
January-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRDW06106


Registration ID:
232384

Page Number

699-702

Share This Article


Jetir RMS

Title

Securing Cloud Information Under Key Presentation

Authors

Abstract

Late news reveals a real attacker who breaks down information security by weighing in cryptographic programming or judging strategies for cryptographic keys through discretionary field tactics. When the encryption key is exposed at this time, the attacker's section is controlled by the Utilitarian Measure Cipher, which is necessary to ensure confidentiality of information. For example, by spreading deadlights horizontally on servers in different administrative locations, for example, holes in each of them can be hoped by the enemy. Finally, if the information is combined with existing schemes, an adversary with encryption keys can separate cipher pieces from a single server into the current business. Nowadays, understand the key to encryption and consider the sequence of communications against an enemy that reaches a huge section of cipher intersections. To this extent, we propose a novel and efficient platform that ensures information suspension, whether encryption keys are dispersed or pushing the enemy toward all ciphertext classes. We isolate the defense of the bastion and we use a model to evaluate its performance through the system. In addition, we will talk about land experiences related to commerce in the scattered cutoff framework below. Our test suggests that the Bastian fittings for bargaining in the current framework, because overhead of over 5% appears to be comparable to existing semi-secure encryption modes.

Key Words

Key exposure, data confidentiality, dispersed storage.

Cite This Article

"Securing Cloud Information Under Key Presentation", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 1, page no.699-702, January 2019, Available :http://www.jetir.org/papers/JETIRDW06106.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Securing Cloud Information Under Key Presentation", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 1, page no. pp699-702, January 2019, Available at : http://www.jetir.org/papers/JETIRDW06106.pdf

Publication Details

Published Paper ID: JETIRDW06106
Registration ID: 232384
Published In: Volume 6 | Issue 1 | Year January-2019
DOI (Digital Object Identifier):
Page No: 699-702
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002964

Print This Page

Current Call For Paper

Jetir RMS