z-logo
open-access-imgOpen Access
Data Security Enhancement in Cloud Computing using Proxy Blind Signature
Author(s) -
Subasish Mohapatra,
Subhadarshini Mohanty,
Arunima Hota,
Shradha Pattanayak
Publication year - 2017
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2017913119
Subject(s) - computer science , cloud computing , proxy (statistics) , computer security , signature (topology) , data science , data mining , machine learning , operating system , geometry , mathematics
Cloud computing is a rapidly growing internet based computing that endeavors to be dynamic, reliable and available with guaranteed quality of service. This has become a sophisticated computing platform or technology for customers as well as organizations for its availability of resources such as software, storage and network with minimum cost. Using the business model like Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS) this environment have increased distribute computing capacity. Preserving confidentiality, integrity and availability are the vexing issues in cloud computing environment. This paper highlights cloud computing threats and proposes a distributed and efficient encryption algorithm to enhance the data security in cloud.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom