Amit Sharma

Work place: Computer Science and Engineering Department, Eternal University, Himachal Pradesh, 173101 India

E-mail: er.amit016@gmail.com

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms

Biography

Amit Sharma was born in India. He has received his M.Tech degree in Computer Science & Engineering from Eternal University, India and B.Tech in Computer Science & Engineering from Kurukshetra University, India. He is an Assistant Professor at the department of Computer Science & Engineering of Eternal University. His current research includes IT Security, Secure Communication in cloud, providing privacy and anonymity in Cloud.

Author Articles
Entity Based Distinctive Secure Storage and Control Enhancement in Cloud

By Divesh Kumar Amit Sharma Surjan Singh

DOI: https://doi.org/10.5815/ijieeb.2017.01.02, Pub. Date: 8 Jan. 2017

Cloud computing acts as rising evolution in Information Technology (IT), boosting the delivery of services and eye-catching returns to its tenants enrolled at low costs of per usage basis. Cloud computing means “everywhere” and provides enormous available resources via internet with ensured quality. With the numerous profits involved, it clears the viewpoint of various businesses to invest in cloud services for accomplishment of their needs in the cloud habitat. Cloud enables computing resources in a service oriented flair instead of burden with lags in traditional setup of unified architecture. With delivery of cloud services occur many obstacles in the cloud to work securely without downfall in its performance. Security has always emerged as a long handed concern with its progression which affects its virtuous implementation. We commence with aspect of security based on parameters named Confidentiality (C), Integrity (I) and Granular Access (GA) and then sent over a secure channel via Secure File Transfer Protocol (SFTP) for secure storage with Elliptic Curve Cryptography (ECC) encryption laid on data. Secure Hash Algorithm (SHA) is used for hash value generation maintaining integrity. The authentication mechanism of secure Graphical One Time Password (GOTPass) provides high end to end security for retrieval process and boost security appliance for data. Data is divided into three security levels as per Secure Quality Index (SQI) generated and storage is isolated to have different security aspects. It provides supplemental controlled security and data protection as associated with the file. User is responsive to pass all security mechanisms to gain access.

[...] Read more.
Other Articles