探索提高计算数据安全的创新方法

Aishwarya Prakash, S. Chauhan
{"title":"探索提高计算数据安全的创新方法","authors":"Aishwarya Prakash, S. Chauhan","doi":"10.1109/ICSMDI57622.2023.00019","DOIUrl":null,"url":null,"abstract":"Thousands of gigabytes of data are produced each minute by everyone in today's society. This data is being stored in clouds worldwide. The study addressed these security issues in a variety of ways. This research suggests a cloud computing security architecture based on cryptography and steganography. In addition to using symmetric and steganographic techniques, the model is said to meet all security standards, such as security resilience, secrecy, authentication, integrity, and non-repudiation. This method employs the Advanced Encryption Standard (AES) 256 and steganography to provide multilayer encryption and decryption at both the transmitter and receiver sides, boosting cloud storage security. This security paradigm delivers transparency to cloud users and service providers to alleviate security worries. The suggested model is written in Python and operates on the Amazon Web Services cloud. While compared to the old method, this approach enhances data security and saves time when uploading and downloading text files.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Exploring Innovative Methods for Enhancing Data Security in Computing\",\"authors\":\"Aishwarya Prakash, S. Chauhan\",\"doi\":\"10.1109/ICSMDI57622.2023.00019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Thousands of gigabytes of data are produced each minute by everyone in today's society. This data is being stored in clouds worldwide. The study addressed these security issues in a variety of ways. This research suggests a cloud computing security architecture based on cryptography and steganography. In addition to using symmetric and steganographic techniques, the model is said to meet all security standards, such as security resilience, secrecy, authentication, integrity, and non-repudiation. This method employs the Advanced Encryption Standard (AES) 256 and steganography to provide multilayer encryption and decryption at both the transmitter and receiver sides, boosting cloud storage security. This security paradigm delivers transparency to cloud users and service providers to alleviate security worries. The suggested model is written in Python and operates on the Amazon Web Services cloud. While compared to the old method, this approach enhances data security and saves time when uploading and downloading text files.\",\"PeriodicalId\":373017,\"journal\":{\"name\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"volume\":\"80 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSMDI57622.2023.00019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

在当今社会,每个人每分钟都会产生数千千兆字节的数据。这些数据被存储在全球的云中。该研究以多种方式解决了这些安全问题。本研究提出了一种基于密码学和隐写术的云计算安全架构。除了使用对称和隐写技术外,据说该模型还满足所有安全标准,例如安全弹性、保密性、身份验证、完整性和不可否认性。该方法采用高级加密标准AES (Advanced Encryption Standard) 256和隐写技术,在发送端和接收端都提供多层加解密,提高了云存储的安全性。这种安全范例为云用户和服务提供商提供了透明度,从而减轻了安全方面的担忧。建议的模型是用Python编写的,并在Amazon Web Services云上运行。与旧方法相比,该方法提高了数据安全性,并节省了上传和下载文本文件的时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Exploring Innovative Methods for Enhancing Data Security in Computing
Thousands of gigabytes of data are produced each minute by everyone in today's society. This data is being stored in clouds worldwide. The study addressed these security issues in a variety of ways. This research suggests a cloud computing security architecture based on cryptography and steganography. In addition to using symmetric and steganographic techniques, the model is said to meet all security standards, such as security resilience, secrecy, authentication, integrity, and non-repudiation. This method employs the Advanced Encryption Standard (AES) 256 and steganography to provide multilayer encryption and decryption at both the transmitter and receiver sides, boosting cloud storage security. This security paradigm delivers transparency to cloud users and service providers to alleviate security worries. The suggested model is written in Python and operates on the Amazon Web Services cloud. While compared to the old method, this approach enhances data security and saves time when uploading and downloading text files.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信