Welcome to IJSDR UGC CARE norms ugc approved journal norms IJRTI Research Journal | ISSN : 2455-2631
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.15 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

Issue: May 2023

Volume 8 | Issue 5

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Authors Name: Shruthi Ramesh , S.Krupa Shankari , Sunandha.B , Akanksha Parvathaneni , Ms.R.Feminol
Unique Id: IJSDR2305043
Published In: Volume 8 Issue 5, May-2023
Abstract: Today, presenting statistics to the community and their safety is a severe issue. A consumer in a fact change device files his record encrypted using a personal key. These belongings are in particular relevant for any large records trade device, on the grounds that any user can crack the facts key, after which it'll be tough for the data owner to hold the safety of the statistics. This article offers a reliable and effective instantiation of the Scheme, proves its protection, and indicates its practical implementation. There are many demanding situations for the statistics owner to proportion their information on servers or inside the cloud. There are various solutions to remedy those problems. These methods are vital for handling the key shared through the statistics master. This record provides the depended-on authority to authenticate users who get right of entry to the cloud statistics. The SHA algorithm is used by a trusted authority to generate a key and supply this key to the consumer in addition to the proprietor. The credit score government module gets the encrypted report the usage of the AES algorithm from the facts owner and calculates the value of the deduction the usage of the MD-V algorithm. It gives a key in its database in order to be used in dynamic operations and to identify the fraudulent birthday party inside the gadget. The trusted authority sends the report to the CSP module for garage in the cloud. It is proven that the resulting key blocks have most of the suited houses that ensure the confidentiality of communication classes from an attack by tampering with the breaching of the community nodes.
Cite Article: "SECURITY CHALLENGES,THREATS AND VULNERABILITIES", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 5, page no.298 - 305, May-2023, Available :http://www.ijsdr.org/papers/IJSDR2305043.pdf
Downloads: 000222060
Publication Details: Published Paper ID: IJSDR2305043
Registration ID:205546
Published In: Volume 8 Issue 5, May-2023
DOI (Digital Object Identifier):
Page No: 298 - 305
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview

Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
DOI (A digital object identifier)

Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media

Indexing Partner