Divesh Kumar

Work place: Computer Science and Engineering Department, Eternal University, Himachal Pradesh, 173101 India

E-mail: diveshkumar16solan@gmail.com

Website:

Research Interests: Autonomic Computing, Information Security, Network Security, Distributed Computing, Computing Platform, Mathematics of Computing

Biography

Divesh Kumar was born in India. He has Graduated from Baddi University of Emerging Sciences and Technology in Information Technology, India in July 2014. He is pursuing his master degree in Computer Science and Engineering from Eternal University, India with specialization in the field of security in cloud computing.He has also organized Blind-coding event being a core member of the Technical committee. He is also active member of the youth club in his university. He also attended workshop of Cyber-Forensics. He has also won first prize trophy in Hardware Assembly event of Technical committee in Tech-Fest. He has attended and won prize in Animation Live seminars. He has also got Award of Achievement certificate under the Oracle Workforce Development program using Java SE6 in Java programming. He has also done trainings in PHP – MySQL, Java SE and BSNL Telecom.

Author Articles
Entity Based Distinctive Secure Storage and Control Enhancement in Cloud

By Divesh Kumar Amit Sharma Surjan Singh

DOI: https://doi.org/10.5815/ijieeb.2017.01.02, Pub. Date: 8 Jan. 2017

Cloud computing acts as rising evolution in Information Technology (IT), boosting the delivery of services and eye-catching returns to its tenants enrolled at low costs of per usage basis. Cloud computing means “everywhere” and provides enormous available resources via internet with ensured quality. With the numerous profits involved, it clears the viewpoint of various businesses to invest in cloud services for accomplishment of their needs in the cloud habitat. Cloud enables computing resources in a service oriented flair instead of burden with lags in traditional setup of unified architecture. With delivery of cloud services occur many obstacles in the cloud to work securely without downfall in its performance. Security has always emerged as a long handed concern with its progression which affects its virtuous implementation. We commence with aspect of security based on parameters named Confidentiality (C), Integrity (I) and Granular Access (GA) and then sent over a secure channel via Secure File Transfer Protocol (SFTP) for secure storage with Elliptic Curve Cryptography (ECC) encryption laid on data. Secure Hash Algorithm (SHA) is used for hash value generation maintaining integrity. The authentication mechanism of secure Graphical One Time Password (GOTPass) provides high end to end security for retrieval process and boost security appliance for data. Data is divided into three security levels as per Secure Quality Index (SQI) generated and storage is isolated to have different security aspects. It provides supplemental controlled security and data protection as associated with the file. User is responsive to pass all security mechanisms to gain access.

[...] Read more.
Other Articles