International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 184 - Issue 30 |
Published: Oct 2022 |
Authors: Abhishek Iche, Abhishek Mhamane, Ayan Shaikh, Mahesh Kadam |
![]() |
Abhishek Iche, Abhishek Mhamane, Ayan Shaikh, Mahesh Kadam . Enhancing Security of Cloud based File Sharing Systems using AES and Proxy-Transformation. International Journal of Computer Applications. 184, 30 (Oct 2022), 9-14. DOI=10.5120/ijca2022922281
@article{ 10.5120/ijca2022922281, author = { Abhishek Iche,Abhishek Mhamane,Ayan Shaikh,Mahesh Kadam }, title = { Enhancing Security of Cloud based File Sharing Systems using AES and Proxy-Transformation }, journal = { International Journal of Computer Applications }, year = { 2022 }, volume = { 184 }, number = { 30 }, pages = { 9-14 }, doi = { 10.5120/ijca2022922281 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2022 %A Abhishek Iche %A Abhishek Mhamane %A Ayan Shaikh %A Mahesh Kadam %T Enhancing Security of Cloud based File Sharing Systems using AES and Proxy-Transformation%T %J International Journal of Computer Applications %V 184 %N 30 %P 9-14 %R 10.5120/ijca2022922281 %I Foundation of Computer Science (FCS), NY, USA
Cloud computing is one of the newest technologies in the era Cloud computing has become an extensively exploited research area in academic and industry. The security challenges related to cloud computing have been extensively studied. This review is aimed to highlight the existing research studies on cloud computing security, threats, and challenges and also proposed the security essentials for web-based applications. Cloud services are facing problems in providing security regarding data and file storage as well as sharing the files through cloud, securing the cloud from the threat actors causing external threats we are trying to address these issues to make reliable and secure file sharing and storage on cloud. We have developed file sharing system, security powered with AES encryption algorithm along with the Proxy Re-encryption (Proxy Transformation) to enhance the security on the cloud platform as well as while transferring the data.