Jaydip Kumar

Work place: Department of Computer Science, Babasaheb Bhimrao Ambedkar University, Lucknow, India

E-mail: jaydipkumar2001@gmail.com

Website:

Research Interests: Cloud Computing

Biography

Jaydip Kumar received his bachelor’s degree in computer application from Indira Gandhi National Open University, India, in 2013. He received his master’s degree in computer application from Indira Gandhi National Open University New Delhi, India, in 2015. He received Ph.D. in Computer Science from Babasaheb Bhimrao Ambedkar University Lucknow, India and published several outstanding research articles. His research interests are cloud computing, cloud data security and cryptography.

Author Articles
Secure Data Storage and Retrieval over the Encrypted Cloud Computing

By Jaydip Kumar Hemant Kumar Karam Veer Singh Vipin Saxena

DOI: https://doi.org/10.5815/ijcnis.2024.04.04, Pub. Date: 8 Aug. 2024

Information security in cloud computing refers to the protection of data items such as text, images, audios and video files. In the modern era, data size is increasing rapidly from gigabytes to terabytes or even petabytes, due to development of a significant amount of real-time data. The majority of data is stored in cloud computing environments and is sent or received over the internet. Due to the fact that cloud computing offers internet-based services, there are various attackers and illegal users over the internet who are consistently trying to gain access to user’s private data without the appropriate permission. Hackers frequently replace any fake data with actual data. As a result, data security has recently generated a lot of attention. To provide access rights of files, the cloud computing is only option for authorized user. To overcome from security threats, a security model is proposed for cloud computing to enhance the security of cloud data through the fingerprint authentication for access control and genetic algorithm is also used for encryption/decryption of cloud data. To search desired data from cloud, fuzzy encrypted keyword search technique is used. The encrypted keyword is stored in cloud storage using SHA256 hashing techniques. The proposed model minimizes the computation time and maximizes the security threats over the cloud. The computed results are presented in the form of figures and tables.

[...] Read more.
Other Articles