International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-4  ( Apr, 2024 )
Past issues
  1. Volume-12,Issue-3  ( Mar, 2024 )
  2. Volume-12,Issue-2  ( Feb, 2024 )
  3. Volume-12,Issue-1  ( Jan, 2024 )
  4. Volume-11,Issue-12  ( Dec, 2023 )
  5. Volume-11,Issue-11  ( Nov, 2023 )
  6. Volume-11,Issue-10  ( Oct, 2023 )
  7. Volume-11,Issue-9  ( Sep, 2023 )
  8. Volume-11,Issue-8  ( Aug, 2023 )
  9. Volume-11,Issue-7  ( Jul, 2023 )
  10. Volume-11,Issue-6  ( Jun, 2023 )

Statistics report
Jul. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 136
Paper Published : 1596
No. of Authors : 4179
  Journal Paper

Paper Title :
Secure Data Transfer based on Cloud

Author :Rakshit Jain, Satwik Yadav, Abdul Ahad Khan

Article Citation :Rakshit Jain ,Satwik Yadav ,Abdul Ahad Khan , (2021 ) " Secure Data Transfer based on Cloud " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 22-26, Volume-9,Issue-7

Abstract : Abstract - Since a large part of the world's population has now inclined towards a vast network called the Internet, there is a large amount of data available which needs to be stored by the companies and it is difficult to store and handle such an immense amount of data. So, the best and efficient way to manage such data is to store it in the cloud. Cloud computing is a well-known and rapidly developing modern technology that allows all personal works, records, and software to be stored and used safely. Although they are on a server, they can be accessed from any public operating system or browser. It allows us to provide a decentralized access management system with anonymous data authentication. It provides the customer with distributed access to an encrypted cloud. One of the most prominent issues that prevent users from fully using cloud storage is security. Cloud computing has a lot of services, but there are also some security issues. To overcome such problems, encryption standards like the DES (Data Encryption Scheme), AES (Advanced Encryption Scheme), and the 3DES (Triple Data Encryption Scheme) are commonly used. But these encryption techniques can be broken through a Brute force attack. Keeping this in mind, we suggest an encryption strategy based on Honey Encryption in this article (HE). This new encryption technique prevents the data from a Brute-force attack by providing plausible but false data for every time an incorrect key is used, which tricks the attacker and prevents the data. Keywords - Cloud Computing, Encryption, Hacker, Key, Honey Encryption.

Type : Research paper

Published : Volume-9,Issue-7


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 50
| Published on 2021-10-27
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World