Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing

被引:0
|
作者
Abolghasemi, Meer Soheil [1 ]
Sefidab, Mandi Mokarrami [1 ]
Atani, Reza Ebrahimi [1 ]
机构
[1] Univ Guilan, Dept Informat Technol, Rasht, Iran
关键词
cloud computing; security; geo-encryption; cryptography; location-based;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a new approach in the field of information technology and development of computer technologies based on the World Wide Web. One of the most important challenges in this area is the security of cloud computing. On the other hand the security of access to critical and confidential information in banks, institutions and etc is extremely essential. Sometimes even with the enormous costs, it is not fully guaranteed and it is compromised by the attackers. In this paper by providing a novel method, we improve the security of data access in cloud computing for a company or any other specific locations using the location-based encryption.
引用
收藏
页码:261 / 265
页数:5
相关论文
共 50 条
  • [21] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
  • [22] Modular Encryption Standard to Improve Security of Health Information in Mobile Cloud Computing
    Varadhaganapathy, S.
    Kumar, P. K. Deepak
    Chandru, G. Mohan
    Arun, Kalki
    PROCEEDINGS OF THIRD DOCTORAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE, DOSCI 2022, 2023, 479 : 315 - 324
  • [23] An effective Access from Cloud Data using Attribute Based Encryption
    Raghuwanshi, Kapil Dev
    Tamrakar, Sitendra
    2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 212 - 218
  • [24] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
  • [25] A cross encryption scheme for data security storage in cloud computing environment
    Kang, Haiyan
    Deng, Jie
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) : 1 - 10
  • [26] A trusted computing framework for cloud data security using role-based access and pattern recognition
    Pradhan, Gyanapriya
    Priyadarsini, Madhukrishna
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 6609 - 6622
  • [27] AN INVESTIGATION ON THE TECHNIQUES USED FOR ENCRYPTION AND AUTHENTICATION FOR DATA SECURITY IN CLOUD COMPUTING
    Rajamani, Tamilarasi
    Sevugan, Prabu
    Purushotham, Swarnalatha
    IIOAB JOURNAL, 2016, 7 (05) : 126 - 138
  • [28] Geo-Encryption: A location based encryption technique for data security
    Borse, Yogita
    Patole, Deepti
    Ahirao, Purnima
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [29] A Bitmap based Data Encryption Scheme in Cloud Computing
    Yoon, Min
    Jang, Miyoung
    Shin, Young-Sung
    Chang, Jae-Woo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 345 - 359
  • [30] Cryptanalysis of Attribute-Based Data Sharing Scheme for data access security in Cloud Computing
    Hu, Aoting
    Jiang, Rui
    Wu, Songyang
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 307 - 310