Security Enhancement in Cloud Computing Using CBC Technique

Security Enhancement in Cloud Computing Using CBC Technique

V. Gunasundhari, M. Parvathi, S. Prabhu
ISBN13: 9781668460603|ISBN10: 1668460602|ISBN13 Softcover: 9781668460610|EISBN13: 9781668460627
DOI: 10.4018/978-1-6684-6060-3.ch017
Cite Chapter Cite Chapter

MLA

Gunasundhari, V., et al. "Security Enhancement in Cloud Computing Using CBC Technique." Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications, edited by Ahmed J. Obaid, et al., IGI Global, 2023, pp. 221-232. https://doi.org/10.4018/978-1-6684-6060-3.ch017

APA

Gunasundhari, V., Parvathi, M., & Prabhu, S. (2023). Security Enhancement in Cloud Computing Using CBC Technique. In A. Obaid, G. Abdul-Majeed, A. Burlea-Schiopoiu, & P. Aggarwal (Eds.), Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (pp. 221-232). IGI Global. https://doi.org/10.4018/978-1-6684-6060-3.ch017

Chicago

Gunasundhari, V., M. Parvathi, and S. Prabhu. "Security Enhancement in Cloud Computing Using CBC Technique." In Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications, edited by Ahmed J. Obaid, et al., 221-232. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6060-3.ch017

Export Reference

Mendeley
Favorite

Abstract

The data protection mechanism in cloud storage systems is based on two-way factored inversion. With the authors' solution, users can store encrypted communications in the cloud and distribute them to their intended recipients. There is no requirement for the sender to have any other information (public key, certificate, etc.) except from the name of the receiver. There are two things the decoder needs in order to decipher the ciphertext. Your computer's private key is the first. The second is a one-of-a-kind computer-based security system for the individual. The ciphertext cannot be cracked without both keys. The loss or theft of your security device will also cause it to become inoperable. In other words, it can't be utilised to read encrypted messages. A cloud server is an option for this. The sender will not be aware of any of this activity. In the same vein, cloud server reads encrypted Chrome content. The system's practicability is supported by analyses of its safety and efficiency.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.