Loading

Security and Privacy Challenges Using Multi-Layer Encryption Approaches in Cloud Computing Environments
Naveen N1, K.Thip peswamy2 

1Naveen N, Assistant Professor, Department of Information Science & Engineering, Kalpataru Institute of Technology, Tiptur, Karnataka, India.
2Dr. K. Thippeswamy, Professor, Department of Computer Science & Engineering, VTU PG Centre, Mysore, Karnataka, India.
Manuscript received on 02 June 2019 | Revised Manuscript received on 10 June 2019 | Manuscript published on 30 June 2019 | PP: 621-629 | Volume-8 Issue-8, June 2019 | Retrieval Number: H6766068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Among multifaceted useful services offered by Information Technology, the launch of Cloud Computing environment is one of types. But the issues and drawback of cloud computing being that the parameters related to privacy and securities are questionable and pose a threat. Reportedly, because of security issues, there occurs fewer business oriented and real time cloud applications in comparison to applications that are consumer based. Concerning this, providing security and privacy from doubtful vendors also pertaining the cloud manager and service provider is of prime importance. Besides it’s also needed to offer real time query outcome to all the authorized users. In this research suggests to the approach of Multi-layer Encryption techniques in cloud computing thus enhancing the security parameters concerning sensitive data Thus with layer ways Encryption technique the data in cloud server can be made more secured with better privacy. Resultant both cloud side and owner of the data gain enhanced security. According to this encryption technique if data-owner’s authorization is not granted then the users are restricted from the data access. The strategies proposed are, Symmetric encryption method of the advanced encryption standard (AES) and Asymmetric encryptions method of the Rivest-shamir Adleman (RSA). The cloud applications that are critical can be benefitted from the above suggested algorithm which claims to be simple and efficient. In Symmetric encryption process a single unique key ought to be shared between users who are bound for message receiving whereas in asymmetrical encryption process the encryption and decryption of messages during communication is achieved using both of private and public key. Later the feasibility analysis is carried for above two encryption algorithms responsible for privacy and security of data relating by way of rest of the algorithms.
Keyword: Cloud computing, Advanced Encryption Standard (AES), Rivest-shamir Adleman (RSA), Asymmetric encryptions, Symmetric encryptions, Feasibility, Multi-layer encryption, Decryption, Privacy, Security.
Scope of the Article: Encryption Methods and Tools.