Abdul Majid Soomro, Awad Bin Naeem, Sanjoy Kumar Debnath, Susama Bagchi, S. Gupta, Kamal Saluja
{"title":"保护数据通信的私有云混合架构","authors":"Abdul Majid Soomro, Awad Bin Naeem, Sanjoy Kumar Debnath, Susama Bagchi, S. Gupta, Kamal Saluja","doi":"10.1109/InCACCT57535.2023.10141705","DOIUrl":null,"url":null,"abstract":"The IT sector is fast embracing cloud computing, a nextgeneration technology. Even though this technology offers many benefits, there are also some downsides. The most challenging aspect of this technology is security. We described a three-tier architecture for private cloud-based encrypted communication where developed a brand-new custom approach and combined steganography to provide an additional layer of protection to data transmission across the cloud. The suggested technique effectively serves as a road map for building a Cloud security architecture. Additionally, the key may be distributed to cloud users using efficient key management strategies, ensuring that only those who are authorized have access to the data.","PeriodicalId":405272,"journal":{"name":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Private Cloud Hybrid Architecture for Protected Data Communication\",\"authors\":\"Abdul Majid Soomro, Awad Bin Naeem, Sanjoy Kumar Debnath, Susama Bagchi, S. Gupta, Kamal Saluja\",\"doi\":\"10.1109/InCACCT57535.2023.10141705\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The IT sector is fast embracing cloud computing, a nextgeneration technology. Even though this technology offers many benefits, there are also some downsides. The most challenging aspect of this technology is security. We described a three-tier architecture for private cloud-based encrypted communication where developed a brand-new custom approach and combined steganography to provide an additional layer of protection to data transmission across the cloud. The suggested technique effectively serves as a road map for building a Cloud security architecture. Additionally, the key may be distributed to cloud users using efficient key management strategies, ensuring that only those who are authorized have access to the data.\",\"PeriodicalId\":405272,\"journal\":{\"name\":\"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/InCACCT57535.2023.10141705\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/InCACCT57535.2023.10141705","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Private Cloud Hybrid Architecture for Protected Data Communication
The IT sector is fast embracing cloud computing, a nextgeneration technology. Even though this technology offers many benefits, there are also some downsides. The most challenging aspect of this technology is security. We described a three-tier architecture for private cloud-based encrypted communication where developed a brand-new custom approach and combined steganography to provide an additional layer of protection to data transmission across the cloud. The suggested technique effectively serves as a road map for building a Cloud security architecture. Additionally, the key may be distributed to cloud users using efficient key management strategies, ensuring that only those who are authorized have access to the data.