Data Security through Encryption Technique

Authors

  • Suruchi Karnani Department of Computer Science and Engineering, SR Group of Institution Jhansi, Uttar Pradesh., India
  • Mr.C.P. Singh Assistant Professor, Department of Computer Science and Engineering, SR Group of Institution Jhansi, Uttar Pradesh., India

DOI:

https://doi.org/10.24113/ijoscience.v3i5.51

Keywords:

Encryption, Security, Confidentiality, Authentication, Integrity.

Abstract

 Secure computing is one of the fastest growing internet based technology that facilitates users, to utilize services by making use of large number of resources without installation of any software. Adoption of this technology is increasing rapidly because of many advantages including reduction of cost and IT load. Now a days, data security is not only issue but the need of communication speed and size of content is also a measurable problem. in the current paper a scheme has been proposed to which uses the concept of data encryption and compression. In current time the focus has been made specialy on cryptography and data compression. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security and safety.

Downloads

Download data is not yet available.

References

Ajna Madanan and Dr. S. Poorna chandra,"Comparative Study on Watermarking & Image Encryption for Secure Communication," International Journal For Trends In Engineering & Technology Volume 5 Issue 1 – May 2015 - ISSN: 2349 –9303.

Bobby Jasuja, Abhishek Pandya, "Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding", International Journal of Computer Applications (0975 – 8887) Volume 116 – No. 21, April2015.

Mrs. Snehal A. Narale, Dr. P.K. Butey, "Employing Security Techniques In The Current World Of Cloud Computing Environment: A Study", Ijcsmc, Vol. 4, Issue. 4, April 2015, pg.796 –801.

Sonali Ghodke,"An Overview of Application Security in the Cloud", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 12, December 2015 ISSN: 2277128X.

Richa Dubey, Apurva Saxena and Sunita Gond,"An Innovative Data Security Techniques Using Cryptography and Steganographic Techniques", Richa Dubey et al,/ (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3) , 2015, 2175-2182.

Aized Amin Soofi, M.Irfan Khan, and Fazal-e-Amin," Encryption Techniques for Cloud Data Confidentiality", International Journal of Grid Distribution Computing Vol.7, No.4 (2014), pp.11-20 http://dx.doi.org/10.14257/ijgdc.2014.7.4.02.

Syeda Rabiya Basri, Rashmi K H, "Attribute Based Revocable Data Access Control for Multi Authority Cloud Storage ", International Journal of Advanced Research in Computer Engineering &Technology(IJARCET) Volume 4, Issue 5, May 2015.

Borse Manoj V, Bhandure Harshad D, Patil Dhiraj M and Bhad Pratik B,"Location Based Encryption-Decryption Approachfor Data Security", International Journal of Computer Applications Technology and Research Volume 3– Issue 10, 610 - 611, 2014.

Dan Boneh, Xavier Boyen, and Hovav Shacham," Short Group Signatures", An extended abstract of this paper is to appear in Advances in Cryptology—CRYPTO 2004,Springer-Verlag.

Downloads

Published

05/31/2017

How to Cite

Karnani, S., & Singh, M. (2017). Data Security through Encryption Technique. SMART MOVES JOURNAL IJOSCIENCE, 3(5), 7–11. https://doi.org/10.24113/ijoscience.v3i5.51