Data Security through Encryption Technique
DOI:
https://doi.org/10.24113/ijoscience.v3i5.51Keywords:
Encryption, Security, Confidentiality, Authentication, Integrity.Abstract
Secure computing is one of the fastest growing internet based technology that facilitates users, to utilize services by making use of large number of resources without installation of any software. Adoption of this technology is increasing rapidly because of many advantages including reduction of cost and IT load. Now a days, data security is not only issue but the need of communication speed and size of content is also a measurable problem. in the current paper a scheme has been proposed to which uses the concept of data encryption and compression. In current time the focus has been made specialy on cryptography and data compression. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security and safety.
Downloads
Metrics
References
Ajna Madanan and Dr. S. Poorna chandra,"Comparative Study on Watermarking & Image Encryption for Secure Communication," International Journal For Trends In Engineering & Technology Volume 5 Issue 1 – May 2015 - ISSN: 2349 –9303.
Bobby Jasuja, Abhishek Pandya, "Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding", International Journal of Computer Applications (0975 – 8887) Volume 116 – No. 21, April2015.
Mrs. Snehal A. Narale, Dr. P.K. Butey, "Employing Security Techniques In The Current World Of Cloud Computing Environment: A Study", Ijcsmc, Vol. 4, Issue. 4, April 2015, pg.796 –801.
Sonali Ghodke,"An Overview of Application Security in the Cloud", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 12, December 2015 ISSN: 2277128X.
Richa Dubey, Apurva Saxena and Sunita Gond,"An Innovative Data Security Techniques Using Cryptography and Steganographic Techniques", Richa Dubey et al,/ (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3) , 2015, 2175-2182.
Aized Amin Soofi, M.Irfan Khan, and Fazal-e-Amin," Encryption Techniques for Cloud Data Confidentiality", International Journal of Grid Distribution Computing Vol.7, No.4 (2014), pp.11-20 http://dx.doi.org/10.14257/ijgdc.2014.7.4.02.
Syeda Rabiya Basri, Rashmi K H, "Attribute Based Revocable Data Access Control for Multi Authority Cloud Storage ", International Journal of Advanced Research in Computer Engineering &Technology(IJARCET) Volume 4, Issue 5, May 2015.
Borse Manoj V, Bhandure Harshad D, Patil Dhiraj M and Bhad Pratik B,"Location Based Encryption-Decryption Approachfor Data Security", International Journal of Computer Applications Technology and Research Volume 3– Issue 10, 610 - 611, 2014.
Dan Boneh, Xavier Boyen, and Hovav Shacham," Short Group Signatures", An extended abstract of this paper is to appear in Advances in Cryptology—CRYPTO 2004,Springer-Verlag.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Suruchi Karnani, Mr.C.P.

This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.