Nishchol Mishra

Work place: School of Information Technology, RGPV University Bhopal

E-mail: nishchol@rgtu.net

Website:

Research Interests: Data Mining

Biography

Nishchol Mishra – He received the Ph.D. degree in computer science and engineering. His research interests include Mining over Social Media Data. He is currently Assistant Professor with state technical university of Madhya Pradesh, RGPV Bhopal.(2School of Information Technology, RGPV University Bhopal).

Author Articles
Multilevel Authentication based Data Security and Verification over Cloud Computing Environment

By Deepak Soni Nishchol Mishra

DOI: https://doi.org/10.5815/ijeme.2017.05.06, Pub. Date: 8 Sep. 2017

There are various algorithm proposed in the area of cloud computing environment. Now a days the cloud computing is the very interesting area for research purpose. Cloud computing environment provides the security of user data and integrity verification with the users data, also cloud provide on demand network access to a shared pool of configurable computing resources like network, servers, storage, applications and services that can be rapidly provisioned and provide with minimum user effort and service provider interaction. Uses of cloud computing services is very easy and also in very low cost. The cloud computing services are on demand over the internet, so it provides the facility to clients that access these services remotely from anywhere, anytime with the help of internet and any devices like pc, laptop mobiles etc. The data or information of cloud user is save in cloud service provider so in the cloud computing environment the security of data and privacy of data is primary issue[1]. In this paper a security model is proposed here we provide a mechanism to cloud user to encrypt their data or sensitive information and generate a integrity verification key then save the data on cloud in encrypted form. The cloud user have many choices like private phase, public phase and hybrid phase and the hybrid phase tier1 and tier 2. In all three sections there are various encryption techniques are implemented like AES (Advanced Encryption Scheme)[9], IDEA, Blowfish[12], And SAES based on the security factors namely authentication, confidentiality, security, privacy, non-repudiation and integrity. In Private phase a Unique token generation mechanism with the help of SHA-2 implemented it helps to ensure the authenticity of the user, The Hybrid section of the model provides On Demand Security Choices Tier one or Tier two and Public section provides faster execution with the help of Blowfish algorithm. Overall the user data Is wrapped in two folds of encryption and integrity verification in all sections.

[...] Read more.
Other Articles