DSpace Repository

Cloud Data Security through Cryptography

Show simple item record

dc.contributor.author Sarkar, Md.Muhib
dc.contributor.author Eti, Samira Ishrat
dc.contributor.author Khatun, Nurmahal
dc.date.accessioned 2022-11-28T03:32:14Z
dc.date.available 2022-11-28T03:32:14Z
dc.date.issued 2022-01-05
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/9067
dc.description.abstract Securing data encryption and decryption using Cryptography and ways. Due to recent developments in crypto analysis, furnishing security to particular contents, dispatches, or digital images using cryptography has come delicate. By using crypto analysis, one can fluently reveal the actuality of retired information in carrier lines. This design introduces a new cryptographic approach for communication between two private parties. The approach introduced in this design makes use of cryptographic ways. In Cryptography we're using RSA and others cryptography algorithm such as steganography, cipher. And we also use the Collective Authentication process to satisfy all services in Cryptography i.e., Access Control, Confidentiality, Integrity, Authentication. In this way, we can maintain the data more securely. Since we use the RSA algorithm, Steganography, cipher for securing the data and again on this we perform cryptography to hide the data in communication. Similar to that any other person in the network cannot pierce the data present in the network. Only the sender and receiver can recoup the communication from the data en_US
dc.language.iso en_US en_US
dc.publisher Daffodil International University en_US
dc.subject Security Key en_US
dc.subject Cryptography en_US
dc.subject Encryption en_US
dc.subject Asymmetric key en_US
dc.title Cloud Data Security through Cryptography en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account