2015
DOI: 10.5120/20801-3484
|View full text |Cite
|
Sign up to set email alerts
|

Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model

Abstract: Cloud computing is one of the emerging and promising field in Information Technology. It provides services to an organization over a network with the ability to scale up or down their service requirements. Cloud computing services are established and provided by a third party, who having the infrastructure. Cloud computing having number of benefits but the most organizations are worried for accepting it due to security issues and challenges having with cloud. Security requirements required at the enterprise le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…In AES, the number of rounds is adjustable depending on the length of the key. It utilizes ten rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys [41]. The encryption process of AES contains the following operations:…”
Section: Advance Encryption Standard (Aes) Algorithmmentioning
confidence: 99%
“…In AES, the number of rounds is adjustable depending on the length of the key. It utilizes ten rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys [41]. The encryption process of AES contains the following operations:…”
Section: Advance Encryption Standard (Aes) Algorithmmentioning
confidence: 99%
“…Suppose there is an employee in MC which wants to upload some data in the cloud then it will send the data to the devoted computer with some decryption numbers. [9] These decryption numbers will help in selecting the data which is needed to select the particular type of credentials. Whenever the integrity of data is needed to be verified than DV is used Master key is the one which will decide whether the integrity is available or not.…”
Section: A Consumer Structurementioning
confidence: 99%
“…In cryptography, the Advanced Encryption Standard [3] is sort of symmetric-key encryption calculation. Each of the figures has a 128-piece square size and having key sizes of 128, 192 and 256 bits, separately.…”
Section: A) Advanced Encryption Standard (Aes)mentioning
confidence: 99%