Topic > Multi-Layer Security for Cloud Storage

Cloud computing is a set of computing services, such as network, software system, storage, hardware, software and resources, and these services are provided to a customer via the Internet. These Cloud Computing services are provided by a third-party provider who owns the infrastructure. The benefits of cloud storage are easy access which means access to your knowledge anywhere and anytime, scalability, resilience, cost efficiency and high data reliability. Because of these benefits, every organization moves its data to the cloud, which means it uses the storage service provided by the cloud provider. It is therefore necessary to protect such data from unauthorized access, modification or denial of services, etc. Therefore cloud security means securing the operations and storage of cloud providers. In this research paper, I propose an algorithm called multi-level algorithm by which an unauthorized user cannot access or modify cloud data or calculations. The work plan is to eliminate data privacy concerns by using cryptographic algorithms to improve cloud security according to the different perspective of cloud customers. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Introduction Cloud computing refers to the manipulation, configuration, and remote access to hardware and software resources. It offers online data storage, infrastructure and applications. Cloud computing offers platform independence, as the software does not need to be installed locally on the PC. Therefore, Cloud Computing is making our business applications mobile and collaborative. Cloud computing refers to both applications provided as services in the International Journal of Software in data centers that provide those services. The services themselves have long been called Software as a Service, so we use that term. The data center hardware and software are what we will call the Cloud. When a Cloud is made available to the public on a pay-as-you-go basis, we call it a Public Cloud; the service sold is Utility Computing. Cloud computing is playing an important role in the IT world due to its revolutionary computing-as-utility model. It emphasizes greater flexibility, scalability and reliability, while promising reduced operational and support costs. Cloud computing, as defined by NIST, is a model for enabling always-on, convenient, on-demand network access to a shared pool of computing resources (e.g., storage, applications, services, etc.) that can be quickly provided and released with minimal management effort or interaction with the service provider Objective Based on the current state of experiments conducted in the area of ​​Multi-Level Security for Cloud Computing using Cryptography, the following objectives arise for the proposed research. To encrypt data in cloud storage with both symmetric key and asymmetric key algorithms. This paper presents a brief overview and comparison of cryptographic algorithms, with an emphasis on symmetric algorithms that should be used for cloud-based applications and services that require encryption of data and links. MethodologyAmazon S3 has a simple web services interface that you can use to store and retrieve any amount of data, at any time, from anywhere on the web. This guide describes how to send requests to create buckets, store and retrieve your objects, and manage permissions on your resources. There3.