Cryptography and Adversarial Analysis for Cloud Data Security
Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over the Internet. The prevalence of Software-as-a-Service has revolutionized work dynamics, fostering a culture of secure remote access across div...
Uloženo v:
| Vydáno v: | 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT) s. 1 - 6 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
15.03.2024
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over the Internet. The prevalence of Software-as-a-Service has revolutionized work dynamics, fostering a culture of secure remote access across diverse devices. Within the realm of Cloud Storage, the imperative for effective security and privacy measures is underscored. This research proposes a robust data security framework employing the Cryptography Splitting Algorithm. User files undergo encryption, increasing security levels from 25 to 75 are securely stored with a cloud service provider. The Cloud Manager empowers users by enhancing security, managing tracking mechanisms, and safeguarding metadata, thus fortifying data confidentiality and flexibility in utilization. Leveraging the Cryptography Splitting technique ensures secure data storage, concurrently enhancing both security and privacy for user data. Furthermore, the proposed methodology undergoes rigorous scrutiny in an adversary setup, incorporating neural network analysis to evaluate the resilience of data security measures. This analysis reveals the encryption scheme protects communication by maintaining a low A-B loss around 0.1 while reducing Eve's ability to intercept messages from 0.7 to 0.2. This research contributes a comprehensive approach to securely managing data in the dynamic landscape of cloud computing. |
|---|---|
| DOI: | 10.1109/ICITIIT61487.2024.10580025 |