blog




  • Essay / Multi-level security for cloud storage

    Cloud computing is a set of computing services, such as network, software system, storage, hardware, software and resources, and these services are provided to a customer via the Internet. These cloud computing services are provided by a third-party provider that owns the infrastructure. The advantages of cloud storage are easy access, i.e. access to your knowledge anywhere and anytime, scalability, resilience, cost-effectiveness and high data reliability. Due to these advantages, every organization moves their data to the cloud, which means they use the storage service provided by the cloud provider. It is therefore necessary to protect this data against unauthorized access, modification or refusal of services, etc. Cloud security therefore means securing the operations and storage of cloud providers. In this research paper, I propose an algorithm called multi-level algorithm through which an unauthorized user cannot access or modify the cloud data or calculations. The work plan is to eliminate concerns about data privacy using cryptographic algorithms to improve security in the cloud according to the different perspectives of cloud customers. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”?Get Original EssayIntroductionCloud computing refers to the remote manipulation, configuration, and access to hardware and software resources. It offers online data storage, infrastructure and applications. Cloud computing offers platform independence, as there is no need for the software to be installed locally on the PC. Thus, Cloud Computing makes our business applications mobile and collaborative. Cloud computing refers to both the applications provided as services through the International Journal of Software and the data centers that provide these services. The services themselves have long been called Software as a Service, which is why we use that term. The hardware and software in the data center constitute what we will call a Cloud. When a Cloud is made available to the public on a pay-as-you-go basis, we call it a Public Cloud; the service sold is Utility Computing. Cloud computing plays an important role in the IT world due to its revolutionary model of computing as a utility. It emphasizes increased flexibility, scalability and reliability, while promising lower operational and support costs. Cloud computing, as defined by NIST, is a model enabling persistent, convenient, on-demand network access to a shared pool of computing resources (e.g., storage, applications, services, etc.) that can be quickly provisioned and released with minimal management effort or service provider interaction Objective Based on the current state of experiments conducted in the field of multi-level security for cloud computing using cryptography, the following objectives are set for the proposed research. To encrypt data on cloud storage, use symmetric key and asymmetric key algorithms. This paper presents a brief overview and comparison of cryptographic algorithms, with emphasis on symmetric algorithms that should be used for cloud-based applications and services that require encryption of data and links. MethodologyAmazon S3 has a simple web services interface that you can use to store and retrieve any amount of data, at3.