Samina H. Khan, Deepali N. Kende, J. Jadhav, Priyanka Bonde, 2023. "Advanced Secure Model for Data Protection via Cloud Computing" ESP International Journal of Science, Humanities & Management Studies(ESP-IJSHMS) Volume 1, Issue 1: 9-13.
Any cloud-based information hoarding model's main goal is to make it simple to access information without compromising its security. Any cloud information capacity model should consider security as a key aspect to ensure efficiency and well-being. In this research, we suggest a secure approach for cloud-based information security. The recommended method provides a remedy for a number of cloud security issues, including insurance of data from any infringement and insurance from a phoney approved character client, both of which have a negative impact on cloud security. The distributed computing issues and difficulties listed in this document compromise information security and protection. It explains the dangers and assaults affecting cloud-stored data. Better cloud-based information encryption is only one of the benefits and flexibility provided by our proposed paradigm for distributed computing security. On the distributed computing platform, it offers customers protection and flexibility when sharing information. Our architecture successfully implements distributed computing security features as encryption, identification and verification, and approval. This design also protects the system from any bogus information owner who can enter harmful data and undermine the main purpose of cloud services. We support the one-time secret key (OTP) as a logging method and transfer technique to safeguard clients and information owners from any fraudulent, unauthorised access to the cloud. Utilising a simulation of the model known as Cutting edge Secure Cloud Server (NG-Cloud), we run our model. These findings strengthen the security assurance measures for end users and information owners against fake users and fake information owners in the cloud.
[1] H. A. Jadad, A. Touzene, K. Day, N. Alziedi, and B. Arafeh, "Setting mindful expectation model for offloading portable application assignments to versatile cloud conditions," Worldwide Diary of Cloud Applications and Figuring, vol. 9, no. 3, pp. 58-74, 2019.
[2] O. O. Olakanmi and A. Dada, "An efficient protection safeguarding approach for secure verifiable rethought registering on untrusted stages," Global Diary of Cloud Appli-cations and Figuring, vol. 9, no. 2, pp. 79-98, 2019.
[3] J. A. Jeba, S. Roy, M. O. Rashid, S. T. Atik, and M. Whaiduzzaman, "Towards green distributed computing an Algorithmic methodology for energy minimization in cloud server farms," Global Diary of Cloud Applications and Figuring, vol. 9, no. 1, pp. 59-81, 2019.
[4] K. Hossain, M. Rahman, and S. Roy, "IoT information pressure and enhancement procedures in distributed storage," Worldwide Diary of Cloud Applications and Processing, vol. 9, no. 2, pp. 43-59, 2019.
[5] R. P. Singh, A. Haleem, M. Javaid, and R. Kataria, "Distributed computing in tackling issues of Corona virus pandemic," Diary of Modern Reconciliation and The board, 2021.
[6] B. Demin, S. Parlati, P. F. Spinnato, and S. Stalio, "U-Light, A confidential cloud approach for molecule material science figuring," In-ternational Diary of Cloud Applications and Registering, vol. 9, no. 1, pp. 1-15, 2019.
[7] P. M. ElKafrawy, A. M. Sauber, and A. M. Hafez, "HDFSX: large information dispersed file framework with little files support," in Procedures of the 2016 twelfth Worldwide PC Engi-neering Gathering (ICENCO), Cairo, Egypt, December 2016.
Cloud Computing(CC), One time password (OTP), Next Generation Cloud(NG-Cloud), Cloud Server(CS), Public Key(PK).