Enhanced Security for Protecting Data in Cloud using Layered Approach


Authors : Nwankwo, U. C; Ugochukwu, E.C; Nwaeze, A.S; Ugwu, E. C; Abundance, M. A; Eze, H.O; Ozuomba U.C; Amadi, E.G; Ngene, N.J

Volume/Issue : Volume 8 - 2023, Issue 8 - August

Google Scholar : https://bit.ly/3TmGbDi

Scribd : https://tinyurl.com/5cezbcws

DOI : https://doi.org/10.5281/zenodo.8337688

Abstract : The major concerns that keep most organizations away from cloud computing are Security and information authenticity. People are wary about providing confidential information to unauthorized parties. Individuals or hackers may intercept and modify electronic documents. Using a password to encrypt data is risky because hackers can gain access to it and exploit it to steal data. As a result, this research provides a solution by building a model for protecting data in the cloud via a layered approach. To implement these concepts, a web system developed with PHP and MySQL was employed. The OODM technique was used for components in the system modules, allowing for easy coupling, decoupling, modification, encapsulation, and reuse, as well as easy maintainability. When compared to the previous system, which depended simply on passwords for authentication, the new technique developed produces a high level of data security.

Keywords : Data protection, Cloud computing, layered approach.

The major concerns that keep most organizations away from cloud computing are Security and information authenticity. People are wary about providing confidential information to unauthorized parties. Individuals or hackers may intercept and modify electronic documents. Using a password to encrypt data is risky because hackers can gain access to it and exploit it to steal data. As a result, this research provides a solution by building a model for protecting data in the cloud via a layered approach. To implement these concepts, a web system developed with PHP and MySQL was employed. The OODM technique was used for components in the system modules, allowing for easy coupling, decoupling, modification, encapsulation, and reuse, as well as easy maintainability. When compared to the previous system, which depended simply on passwords for authentication, the new technique developed produces a high level of data security.

Keywords : Data protection, Cloud computing, layered approach.

CALL FOR PAPERS


Paper Submission Last Date
31 - May - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe