Cybersecurity Measures for Secure Cloud-Based Data Storage and Sharing Utilizing AES and RSA Encryption
Keywords:
AWS Dispersed capacity, Available Encryption, Multi-Expression Search, Multi-Client Access, Search and Access Models adjust data the board. Search Model, and Access Model.Abstract
Of late, there has been a making interest in AWS cloud-based information limit associations considering their expense capacity and sensible association. These associations work in open affiliations, making it squeezing for suppliers to focus in on secure information gathering and sharing systems to maintain information secret and client confirmation. Encryption is the most typically used technique to protect sensitive data from unapproved access, yet encoding data, such as using AES, may not totally meet the creating necessities of data the leaders. Furthermore, by genuinely controlling download demands, it is useful to lessen the wagered of EDOs seeks after that could upset help accessibility. This paper looks out for twofold access control inside the setting of AWS cloud-based limit, zeroing in on the two information access and download demands, while keeping a congruity among security and proficiency. We propose two obvious twofold access control frameworks changed to unequivocal conditions and give a wary evaluation of their security and execution.
References
- Joseph An Akinyele, Christina Garman, Ian Miers, Matthew W Pagano, Michael Rushanan, Matthew Green, and Aviel D Rubin, titled "Engage: An Approach for Swiftly Developing Cryptosystems," which was featured in the Journal of Cryptographic Planning in 2013, the authors introduce a framework for expeditiously creating and testing cryptographic systems.
- Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata, titled "Innovative Advancements in Computer Processor-Based Verification and Remediation," the authors discuss their research findings presented at the Studio on Hardware and Architectural Support for Security and Privacy (HASP) in 2013. Their work focuses on proposing novel approaches to enhancing the security and reliability of computer processors.
- "Present-Day Family: An Adaptable Hybrid Encryption Scheme Combining Attribute-Based Encryption, Symmetric Public Encryption, and SGX," Alexandros Bakas and Antonis Michalas introduced a modern series of encryption techniques. This research was presented at SecureComm 2019, covering a range of pages from 472 to 486.
- Victor Costan and Srinivas Devadas authored a paper titled "Intel SGX Understood," which was published in the IACR Cryptology ePrint File in 2016. This paper spans 118 pages and comprehensively explores the subject matter.
- Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, and Sergey Gorbunov. IRON: significant encryption utilizing intel SGX. In Frameworks of the 2017 ACM SIGSAC Get-together on PC and Correspondences Security, CCS 2017, pages 765-782, 2017.
- Tatsuaki Okamoto and Eiichiro Fujisaki. symmetric and unbalanced encryption plans can be joined safely. Pages 537-554 in Advances in Cryptology-CRYPTO 1999. 1999 Springer.
- Brent Waters, Amit Sahai, Omkant Pandey, and Vipul Goyal. For fine-grained induction control of encoded data, use property-based encryption. Page 89–98 of ACM CCS 2006. ACM, 2006.
- Jianying Zhou, Jinguang Han, Willy Susilo, Yi Mu, and Man Ho Allen Au. More assurance and security are being added to the decentralized, quality-based ciphertext encryption system. 2015;10(3):665–678 IEEE Transactions on Information Crime Location Examination and Security.
- Doug Jacobson's theory Joseph Idziorek, and Engraving Tannian. attribution of dishonest cloud usage of resources. Pages 99–106 in IEEE CLOUD 2012. IEEE, 2012.
- Yichen Zhang, Jiguo Li, Xiaonan Lin, and Jinguang Han. Ksfoabe: Reconsidered using expression search functionality with property-based encryption for cloud storage. 10(5):715-725, IEEE Transactions on Services Computing, 2017.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.