Abdul Majid Soomro, Awad Bin Naeem, Sanjoy Kumar Debnath, Susama Bagchi, S. Gupta, Kamal Saluja
{"title":"Private Cloud Hybrid Architecture for Protected Data Communication","authors":"Abdul Majid Soomro, Awad Bin Naeem, Sanjoy Kumar Debnath, Susama Bagchi, S. Gupta, Kamal Saluja","doi":"10.1109/InCACCT57535.2023.10141705","DOIUrl":null,"url":null,"abstract":"The IT sector is fast embracing cloud computing, a nextgeneration technology. Even though this technology offers many benefits, there are also some downsides. The most challenging aspect of this technology is security. We described a three-tier architecture for private cloud-based encrypted communication where developed a brand-new custom approach and combined steganography to provide an additional layer of protection to data transmission across the cloud. The suggested technique effectively serves as a road map for building a Cloud security architecture. Additionally, the key may be distributed to cloud users using efficient key management strategies, ensuring that only those who are authorized have access to the data.","PeriodicalId":405272,"journal":{"name":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/InCACCT57535.2023.10141705","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The IT sector is fast embracing cloud computing, a nextgeneration technology. Even though this technology offers many benefits, there are also some downsides. The most challenging aspect of this technology is security. We described a three-tier architecture for private cloud-based encrypted communication where developed a brand-new custom approach and combined steganography to provide an additional layer of protection to data transmission across the cloud. The suggested technique effectively serves as a road map for building a Cloud security architecture. Additionally, the key may be distributed to cloud users using efficient key management strategies, ensuring that only those who are authorized have access to the data.