Published Fast: - If it's accepted, We aim to get your article published online in 48 hours.

Home / Articles

No Article found
DESIGNING CLOAKING WALL MODEL WITH LEAKAGE SUPPRESSED AND LIGHTWEIGHT ACCESS CONTROL FOR CLOUD DATA STORAGE
Author Name

Mr. Rajasekar L and Mr. Srinivasan S

Abstract

In the era of cloud computing, ensuring the security and privacy of sensitive data has become paramount. The aim of this project is to develop a cutting-edge model to fortify cloud data storage systems against unauthorized access and information leakage. The Cloaking Wall Model addresses the challenge of data leakage through the implementation of state-of-the-art leakage suppression techniques. Leveraging advanced cryptographic protocols and anomaly detection algorithms, the model intelligently identifies and mitigates potential data leakage threats, safeguarding sensitive information from unauthorized disclosure. The Cloaking Wall Model enhances cloud data security through Long-Term, Multi-Region, Time-based, and Geolocation-based cloaking methods. By integrating these features, the system addresses vulnerabilities associated with data leakage and ensures efficient access control. The model introduces a lightweight access control mechanism, aiming to strike a balance between robust security and operational efficiency. Traditional access control methods often introduce significant computational overhead, impacting the overall performance of cloud systems. In contrast, the lightweight access control in the Cloaking Wall Model optimizes resource utilization, ensuring rapid and secure data access without compromising system efficiency. The cryptographic protocols employed in leakage suppression not only encrypt and obfuscate data but also generate encrypted keys that are verified during the access control process. This ensures the integrity and authenticity of the data, preventing the unauthorized alterations. The Cloaking Wall model contributes to advancing secure cloud storage paradigms by providing a comprehensive solution that balances robust security in the cloud environment. Keywords— Long term cloaking, Multi-Region cloaking, Time and Geolocation cloaking, Chacha20.



Published On :
2024-04-03

Article Download :
Publish your academic thesis as a book with ISBN Contact – connectirj@gmail.com
Visiters Count :