TY - JOUR
T1 - A Hybrid Solution for Secure Privacy-Preserving Cloud Storage & Information Retrieval
AU - Kumar, Ankit
AU - Aljrees, Turki
AU - Hsieh, Sun Yuan
AU - Singh, Kamred Udham
AU - Singh, Teekam
AU - Raja, Linesh
AU - Samriya, Jitendra Kumar
AU - Mundotiya, Rajesh Kumar
N1 - Publisher Copyright:
© 2023, Human-centric Computing and Information Sciences.All Rights Reserved.
PY - 2023
Y1 - 2023
N2 - Cloud storage is an emerging archetype used by businesses for data storage. Clients require easy access to data in the cloud, which helps clients with limited computing power move their high-value, high-risk principle jobs to the cloud. The primary concern of this study is towards flawless verifying, checking data bundles, and determining modules to carry out the project. As discussed at several research platforms, each client is concerned about data storage and retrieval. Data security is critical in cloud computing, and thus monitoring has evolved into a vigilance that abstracts the monitoring process. Request made by clients for security planning is always computationally exclusive. As a result, each customer is concerned as to their verified condition. This paper will highlight a secure cloud communication method for client data to address the afore-mentioned issues. Synchronization creates secret hare keys, combined with a model-encrypted data packet sent to the cloud. These secure data are then sent over a public network, subject to monitoring to avert data leakage to an unauthorized party. They lack the cohesion to outsource data storage to the cloud deliberately. As an outcome of this model's distribution, the perception of authorized data owners would be changed regarding cloud storage up to 97.6%,
AB - Cloud storage is an emerging archetype used by businesses for data storage. Clients require easy access to data in the cloud, which helps clients with limited computing power move their high-value, high-risk principle jobs to the cloud. The primary concern of this study is towards flawless verifying, checking data bundles, and determining modules to carry out the project. As discussed at several research platforms, each client is concerned about data storage and retrieval. Data security is critical in cloud computing, and thus monitoring has evolved into a vigilance that abstracts the monitoring process. Request made by clients for security planning is always computationally exclusive. As a result, each customer is concerned as to their verified condition. This paper will highlight a secure cloud communication method for client data to address the afore-mentioned issues. Synchronization creates secret hare keys, combined with a model-encrypted data packet sent to the cloud. These secure data are then sent over a public network, subject to monitoring to avert data leakage to an unauthorized party. They lack the cohesion to outsource data storage to the cloud deliberately. As an outcome of this model's distribution, the perception of authorized data owners would be changed regarding cloud storage up to 97.6%,
UR - http://www.scopus.com/inward/record.url?scp=85151006566&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85151006566&partnerID=8YFLogxK
U2 - 10.22967/HCIS.2023.13.011
DO - 10.22967/HCIS.2023.13.011
M3 - Article
AN - SCOPUS:85151006566
SN - 2192-1962
VL - 13
JO - Human-centric Computing and Information Sciences
JF - Human-centric Computing and Information Sciences
M1 - 11
ER -