Multiple key Generation for Securing Data Sharing and Backup Article Swipe
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.35940/ijeat.e6926.088619
Currently a data sharing and data backup is been maintained by the intermediator of cloud admin provider also to reduce the cost of intermediator management and to get an authentication. It is introducing to provide a security and efficient access to large amount of outsourced data. In this project we are proposing a key distribution to solve the problem (encryption and decryption). As the user is provided two types of key by the admin to secure the data outsourcing and data backup which is been encrypted and decrypted so that threading and attacks can be reduced using cryptography based key mechanism. We are introducing a key mechanism using RSA and AES for generating keys files to secure the data. By this cryptographic key mechanism, the cloud users are free from the data management, consumption of time, cost.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.35940/ijeat.e6926.088619
- OA Status
- diamond
- Cited By
- 2
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4250634491
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4250634491Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.35940/ijeat.e6926.088619Digital Object Identifier
- Title
-
Multiple key Generation for Securing Data Sharing and BackupWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2019Year of publication
- Publication date
-
2019-08-27Full publication date if available
- Authors
-
R Hariharan., D Jayashree., Vishal Chauhan, Vibek Jyoti Roy, K AnandhiList of authors in order
- Landing page
-
https://doi.org/10.35940/ijeat.e6926.088619Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.35940/ijeat.e6926.088619Direct OA link when available
- Concepts
-
Backup, Computer science, Key management, Key generation, Encryption, Data sharing, Key (lock), Computer security, Cryptography, Key distribution, Authentication (law), Cloud computing, Data security, Computer network, Public-key cryptography, Database, Operating system, Alternative medicine, Medicine, PathologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 1, 2020: 1Per-year citation counts (last 5 years)
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4250634491 |
|---|---|
| doi | https://doi.org/10.35940/ijeat.e6926.088619 |
| ids.doi | https://doi.org/10.35940/ijeat.e6926.088619 |
| ids.openalex | https://openalex.org/W4250634491 |
| fwci | 0.36401004 |
| type | article |
| title | Multiple key Generation for Securing Data Sharing and Backup |
| biblio.issue | 6 |
| biblio.volume | 8 |
| biblio.last_page | 169 |
| biblio.first_page | 166 |
| topics[0].id | https://openalex.org/T11614 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9835000038146973 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cloud Data Security Solutions |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9677000045776367 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2780945871 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7667415142059326 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q194274 |
| concepts[0].display_name | Backup |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.756901741027832 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C17886624 |
| concepts[2].level | 3 |
| concepts[2].score | 0.7287203669548035 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1320561 |
| concepts[2].display_name | Key management |
| concepts[3].id | https://openalex.org/C163173736 |
| concepts[3].level | 3 |
| concepts[3].score | 0.6044778227806091 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3308558 |
| concepts[3].display_name | Key generation |
| concepts[4].id | https://openalex.org/C148730421 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5953719615936279 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[4].display_name | Encryption |
| concepts[5].id | https://openalex.org/C2779965156 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5706241130828857 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q5227350 |
| concepts[5].display_name | Data sharing |
| concepts[6].id | https://openalex.org/C26517878 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5685245990753174 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[6].display_name | Key (lock) |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.5307733416557312 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C178489894 |
| concepts[8].level | 2 |
| concepts[8].score | 0.5296977162361145 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[8].display_name | Cryptography |
| concepts[9].id | https://openalex.org/C160333310 |
| concepts[9].level | 4 |
| concepts[9].score | 0.4618920385837555 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q6398153 |
| concepts[9].display_name | Key distribution |
| concepts[10].id | https://openalex.org/C148417208 |
| concepts[10].level | 2 |
| concepts[10].score | 0.44960832595825195 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[10].display_name | Authentication (law) |
| concepts[11].id | https://openalex.org/C79974875 |
| concepts[11].level | 2 |
| concepts[11].score | 0.437140554189682 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[11].display_name | Cloud computing |
| concepts[12].id | https://openalex.org/C10511746 |
| concepts[12].level | 3 |
| concepts[12].score | 0.43459323048591614 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q899388 |
| concepts[12].display_name | Data security |
| concepts[13].id | https://openalex.org/C31258907 |
| concepts[13].level | 1 |
| concepts[13].score | 0.40336212515830994 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[13].display_name | Computer network |
| concepts[14].id | https://openalex.org/C203062551 |
| concepts[14].level | 3 |
| concepts[14].score | 0.37223732471466064 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[14].display_name | Public-key cryptography |
| concepts[15].id | https://openalex.org/C77088390 |
| concepts[15].level | 1 |
| concepts[15].score | 0.22968924045562744 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[15].display_name | Database |
| concepts[16].id | https://openalex.org/C111919701 |
| concepts[16].level | 1 |
| concepts[16].score | 0.09131082892417908 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[16].display_name | Operating system |
| concepts[17].id | https://openalex.org/C204787440 |
| concepts[17].level | 2 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q188504 |
| concepts[17].display_name | Alternative medicine |
| concepts[18].id | https://openalex.org/C71924100 |
| concepts[18].level | 0 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[18].display_name | Medicine |
| concepts[19].id | https://openalex.org/C142724271 |
| concepts[19].level | 1 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q7208 |
| concepts[19].display_name | Pathology |
| keywords[0].id | https://openalex.org/keywords/backup |
| keywords[0].score | 0.7667415142059326 |
| keywords[0].display_name | Backup |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.756901741027832 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/key-management |
| keywords[2].score | 0.7287203669548035 |
| keywords[2].display_name | Key management |
| keywords[3].id | https://openalex.org/keywords/key-generation |
| keywords[3].score | 0.6044778227806091 |
| keywords[3].display_name | Key generation |
| keywords[4].id | https://openalex.org/keywords/encryption |
| keywords[4].score | 0.5953719615936279 |
| keywords[4].display_name | Encryption |
| keywords[5].id | https://openalex.org/keywords/data-sharing |
| keywords[5].score | 0.5706241130828857 |
| keywords[5].display_name | Data sharing |
| keywords[6].id | https://openalex.org/keywords/key |
| keywords[6].score | 0.5685245990753174 |
| keywords[6].display_name | Key (lock) |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.5307733416557312 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/cryptography |
| keywords[8].score | 0.5296977162361145 |
| keywords[8].display_name | Cryptography |
| keywords[9].id | https://openalex.org/keywords/key-distribution |
| keywords[9].score | 0.4618920385837555 |
| keywords[9].display_name | Key distribution |
| keywords[10].id | https://openalex.org/keywords/authentication |
| keywords[10].score | 0.44960832595825195 |
| keywords[10].display_name | Authentication (law) |
| keywords[11].id | https://openalex.org/keywords/cloud-computing |
| keywords[11].score | 0.437140554189682 |
| keywords[11].display_name | Cloud computing |
| keywords[12].id | https://openalex.org/keywords/data-security |
| keywords[12].score | 0.43459323048591614 |
| keywords[12].display_name | Data security |
| keywords[13].id | https://openalex.org/keywords/computer-network |
| keywords[13].score | 0.40336212515830994 |
| keywords[13].display_name | Computer network |
| keywords[14].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[14].score | 0.37223732471466064 |
| keywords[14].display_name | Public-key cryptography |
| keywords[15].id | https://openalex.org/keywords/database |
| keywords[15].score | 0.22968924045562744 |
| keywords[15].display_name | Database |
| keywords[16].id | https://openalex.org/keywords/operating-system |
| keywords[16].score | 0.09131082892417908 |
| keywords[16].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.35940/ijeat.e6926.088619 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210210796 |
| locations[0].source.issn | 2249-8958 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2249-8958 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Engineering and Advanced Technology |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Engineering and Advanced Technology |
| locations[0].landing_page_url | https://doi.org/10.35940/ijeat.e6926.088619 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5073781731 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | R Hariharan. |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Hariharan. R |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5023146436 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | D Jayashree. |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Jayashree. D |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5069677622 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5478-5080 |
| authorships[2].author.display_name | Vishal Chauhan |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Vishal Chauhan |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5114013333 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Vibek Jyoti Roy |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Vibek Jyoti Roy |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5019695032 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | K Anandhi |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Anandhi K |
| authorships[4].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.35940/ijeat.e6926.088619 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2022-05-12T00:00:00 |
| display_name | Multiple key Generation for Securing Data Sharing and Backup |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11614 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9835000038146973 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cloud Data Security Solutions |
| related_works | https://openalex.org/W2965905066, https://openalex.org/W4229602839, https://openalex.org/W2382371199, https://openalex.org/W2791490729, https://openalex.org/W2081422519, https://openalex.org/W2358235859, https://openalex.org/W2364840942, https://openalex.org/W2036351525, https://openalex.org/W2075972269, https://openalex.org/W3174871241 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2020 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.35940/ijeat.e6926.088619 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210210796 |
| best_oa_location.source.issn | 2249-8958 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2249-8958 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Engineering and Advanced Technology |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Engineering and Advanced Technology |
| best_oa_location.landing_page_url | https://doi.org/10.35940/ijeat.e6926.088619 |
| primary_location.id | doi:10.35940/ijeat.e6926.088619 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210210796 |
| primary_location.source.issn | 2249-8958 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2249-8958 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Engineering and Advanced Technology |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Engineering and Advanced Technology |
| primary_location.landing_page_url | https://doi.org/10.35940/ijeat.e6926.088619 |
| publication_date | 2019-08-27 |
| publication_year | 2019 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 1, 35, 52, 104 |
| abstract_inverted_index.As | 62 |
| abstract_inverted_index.By | 119 |
| abstract_inverted_index.In | 46 |
| abstract_inverted_index.It | 30 |
| abstract_inverted_index.We | 101 |
| abstract_inverted_index.an | 28 |
| abstract_inverted_index.be | 94 |
| abstract_inverted_index.by | 10, 71 |
| abstract_inverted_index.is | 7, 31, 65, 83 |
| abstract_inverted_index.of | 13, 22, 43, 69, 134 |
| abstract_inverted_index.so | 88 |
| abstract_inverted_index.to | 18, 26, 33, 40, 55, 74, 115 |
| abstract_inverted_index.we | 49 |
| abstract_inverted_index.AES | 110 |
| abstract_inverted_index.RSA | 108 |
| abstract_inverted_index.and | 4, 25, 37, 60, 79, 86, 91, 109 |
| abstract_inverted_index.are | 50, 102, 127 |
| abstract_inverted_index.can | 93 |
| abstract_inverted_index.for | 111 |
| abstract_inverted_index.get | 27 |
| abstract_inverted_index.key | 53, 70, 99, 105, 122 |
| abstract_inverted_index.the | 11, 20, 57, 63, 72, 76, 117, 124, 130 |
| abstract_inverted_index.two | 67 |
| abstract_inverted_index.also | 17 |
| abstract_inverted_index.been | 8, 84 |
| abstract_inverted_index.cost | 21 |
| abstract_inverted_index.data | 2, 5, 77, 80, 131 |
| abstract_inverted_index.free | 128 |
| abstract_inverted_index.from | 129 |
| abstract_inverted_index.keys | 113 |
| abstract_inverted_index.that | 89 |
| abstract_inverted_index.this | 47, 120 |
| abstract_inverted_index.user | 64 |
| abstract_inverted_index.admin | 15, 73 |
| abstract_inverted_index.based | 98 |
| abstract_inverted_index.cloud | 14, 125 |
| abstract_inverted_index.cost. | 136 |
| abstract_inverted_index.data. | 45, 118 |
| abstract_inverted_index.files | 114 |
| abstract_inverted_index.large | 41 |
| abstract_inverted_index.solve | 56 |
| abstract_inverted_index.time, | 135 |
| abstract_inverted_index.types | 68 |
| abstract_inverted_index.users | 126 |
| abstract_inverted_index.using | 96, 107 |
| abstract_inverted_index.which | 82 |
| abstract_inverted_index.access | 39 |
| abstract_inverted_index.amount | 42 |
| abstract_inverted_index.backup | 6, 81 |
| abstract_inverted_index.reduce | 19 |
| abstract_inverted_index.secure | 75, 116 |
| abstract_inverted_index.attacks | 92 |
| abstract_inverted_index.problem | 58 |
| abstract_inverted_index.project | 48 |
| abstract_inverted_index.provide | 34 |
| abstract_inverted_index.reduced | 95 |
| abstract_inverted_index.sharing | 3 |
| abstract_inverted_index.provided | 66 |
| abstract_inverted_index.provider | 16 |
| abstract_inverted_index.security | 36 |
| abstract_inverted_index.Currently | 0 |
| abstract_inverted_index.decrypted | 87 |
| abstract_inverted_index.efficient | 38 |
| abstract_inverted_index.encrypted | 85 |
| abstract_inverted_index.mechanism | 106 |
| abstract_inverted_index.proposing | 51 |
| abstract_inverted_index.threading | 90 |
| abstract_inverted_index.generating | 112 |
| abstract_inverted_index.maintained | 9 |
| abstract_inverted_index.management | 24 |
| abstract_inverted_index.mechanism, | 123 |
| abstract_inverted_index.mechanism. | 100 |
| abstract_inverted_index.outsourced | 44 |
| abstract_inverted_index.(encryption | 59 |
| abstract_inverted_index.consumption | 133 |
| abstract_inverted_index.introducing | 32, 103 |
| abstract_inverted_index.management, | 132 |
| abstract_inverted_index.outsourcing | 78 |
| abstract_inverted_index.cryptography | 97 |
| abstract_inverted_index.decryption). | 61 |
| abstract_inverted_index.distribution | 54 |
| abstract_inverted_index.cryptographic | 121 |
| abstract_inverted_index.intermediator | 12, 23 |
| abstract_inverted_index.authentication. | 29 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 5 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.5 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.75365415 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |