Karan Sajeeth, S. Mahajan, Avanishkumar Pathak, Rishabh Saudagar, Sandeep Shiravale
{"title":"使用摘要算法的安全云存储","authors":"Karan Sajeeth, S. Mahajan, Avanishkumar Pathak, Rishabh Saudagar, Sandeep Shiravale","doi":"10.1109/ICCMC56507.2023.10083802","DOIUrl":null,"url":null,"abstract":"In today's cyberspace, everyone stores data in a cloud, whether it be images, personal documents, or any other, and it all accesses a remote system by using the applications/technology. With the use of cloud networks in the infrastructure, the information uploaded should be maintained secure. The spread of cloud storages helps in strengthening the recent technological developments, and it is expanding the limits of the infrastructure as well. The organizations are slowly shifting their base to the cloud systems, and some service providers help in creating space in the existing storages. Cryptography is a critical tool for preventing this from happening. It protects information and communications by enforcing a set of rules, that enable only those who are supposed to receive the information, to access and handle it. It can protect crucial cloud data while without interfering with data transmission. Thus, a need to improve the current security standards and protocols used in cloud storage and make it much safer for the user, has been noticed. The goal of this research is to provide a reliable cloud service that secures data such that integrity is maintained and is safe from external threats.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Cloud Storage using a Digest Algorithm\",\"authors\":\"Karan Sajeeth, S. Mahajan, Avanishkumar Pathak, Rishabh Saudagar, Sandeep Shiravale\",\"doi\":\"10.1109/ICCMC56507.2023.10083802\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's cyberspace, everyone stores data in a cloud, whether it be images, personal documents, or any other, and it all accesses a remote system by using the applications/technology. With the use of cloud networks in the infrastructure, the information uploaded should be maintained secure. The spread of cloud storages helps in strengthening the recent technological developments, and it is expanding the limits of the infrastructure as well. The organizations are slowly shifting their base to the cloud systems, and some service providers help in creating space in the existing storages. Cryptography is a critical tool for preventing this from happening. It protects information and communications by enforcing a set of rules, that enable only those who are supposed to receive the information, to access and handle it. It can protect crucial cloud data while without interfering with data transmission. Thus, a need to improve the current security standards and protocols used in cloud storage and make it much safer for the user, has been noticed. The goal of this research is to provide a reliable cloud service that secures data such that integrity is maintained and is safe from external threats.\",\"PeriodicalId\":197059,\"journal\":{\"name\":\"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC56507.2023.10083802\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC56507.2023.10083802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In today's cyberspace, everyone stores data in a cloud, whether it be images, personal documents, or any other, and it all accesses a remote system by using the applications/technology. With the use of cloud networks in the infrastructure, the information uploaded should be maintained secure. The spread of cloud storages helps in strengthening the recent technological developments, and it is expanding the limits of the infrastructure as well. The organizations are slowly shifting their base to the cloud systems, and some service providers help in creating space in the existing storages. Cryptography is a critical tool for preventing this from happening. It protects information and communications by enforcing a set of rules, that enable only those who are supposed to receive the information, to access and handle it. It can protect crucial cloud data while without interfering with data transmission. Thus, a need to improve the current security standards and protocols used in cloud storage and make it much safer for the user, has been noticed. The goal of this research is to provide a reliable cloud service that secures data such that integrity is maintained and is safe from external threats.