Article Preview
TopIntroduction
If a message has been altered or modified during transmission, the receiver must be capable of detecting it. No one should be able to exchange a false message for the actual message, or parts of it. (Delfs, Knebl, & Knebl, 2002; Gou, Yamaguchi, & Gupta, 2017). Fourthly, non-repudiation is the digital signature that provides the non-repudiation service to solve a problem that may happen when the sender does not pass the message.
The concept of cloud computing appeared around the year 2000, but the concept of computing appeared as a service around the year 1960 (“Zdnet,”), cloud computing is used to store and share data and it is a new form of data storage and retrieval. Examples include Google Drive, Dropbox, etc. A personal account is created with the username and password where a specific capacity is given to storage in the cloud, storage and access to data can be done at any time and from any place with the internet, the cloud can be used by users, companies, and governments (Gupta, Yamaguchi, & Agrawal, 2018). In the cloud, you'll find everything from standard office apps to storage, networking, and the ability to handle natural language and artificial intelligence. (Al-Nawasrah, Almomani, Atawneh, Alauthman, & Computing, 2020; Almomani, Alauthman, Alweshah, Dorgham, & Albalas, 2019; Dorgham, Al-Rahamneh, Almomani, Khatatneh, & Computing, 2018; Manasrah, Smadi, ALmomani, & Sciences, 2017; “Zdnet,”).
“Cloud computing” describes data centers that are accessible to multiple users via the Internet. (Bhushan, & Gupta, 2017; Mishra, Gupta, & Gupta 2020). The user can upload data on the cloud and share it with others; no one can take the data or know what the data is. In addition to that, cloud security consists of a set of procedures, controls, policies, and technologies that work together to protect systems, infrastructure, as well as cloud-based data. Storing data in the cloud rather than on local storage provides a number of advantages, but also raises questions about security and privacy. Store data in encrypted form to alleviate these issues. (Gupta, 2021).
Public, private, communal, and hybrid clouds are the four categories of clouds. The public cloud is a typical model and more popular, where users can use the cloud services by cloud service providers, such as Amazon, Google, etc. Private cloud use by a singular entity with high privacy, a private cloud used by organizations that required infrastructure for their applications, community cloud is used by a sociality of users, several organizations share the infrastructure, hybrid cloud is simply a combination of many clouds, it allows to users control in infrastructure.
The data on the cloud is hacked, due to poor protection and security. We specialize in data encryption operations (Stergiou, Psannis, Gupta, & Ishibashi, 2018; Gupta, & Agrawal, 2021), many encryption operations use a key to decryption and obtain data, in traditional encryption methods the key is stored with the user which leads to loss of the key and loss of information completely, we have developed a mechanism that stores the key with data and stores it in two clouds. When we apply our algorithm, we guarantee no data loss.