z-logo
open-access-imgOpen Access
Improved Security of Data in Cloud Network to Prevent Detect Key Recovery Attacks Using Node Creation for Authentication
Author(s) -
Adya Zizwan Putra
Publication year - 2019
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1230/1/012065
Subject(s) - computer science , computer security , key (lock) , encryption , the internet , cloud computing , forward secrecy , cryptography , public key cryptography , computer network , world wide web , operating system
The use of internet in the past decade has increased rapidly people using it for transmission of data saving their works, storing all the private information in a system and transmitting through internet. Due to high usage of internet there is also possibility of losing data by unauthorized access and getting hacked and misuse of data. Previously there was a method used known as kids, but the problem with this method was the method used for generation of key and keeping it secrecy, the attackers could easily get access to the key after black box attack. In this paper the proposed system helps to provide more security and prevents it from attacks and also protect the data stored in the system. The proposed schema can be implemented in hospitals for health care domain, for saving the data of Patience by using cloud storage by using it in the detection system. Many developers and researched have introduced schemes in Machines learning and one of this scheme was key based detection system, But this system required more security to prevent from the attackers, in the proposed module am using cryptographic algorithm for creating secret key and for saving the data and Bowl Fish algorithm to hide the data from the attackers and recover the key from the AES algorithm which is saved in encrypted format which has steps of verification to recover the key and give prevention against unauthorized usage and it provides security from the attackers by saving all the data of patience in a hospital using different domains kept in cloud platform.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here