Enhancing cloud data security: User-centric approaches and advanced mechanisms
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.1.29Keywords:
Cloud storage, Encryption algorithms, Biometric authentication, Cloud data security, Security validation, Authentication success rate.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud storage has led to a transformative era of data management for organizations, but this paradigm shift has also introduced critical security challenges. This paper is motivated by the urgent need to strengthen cloud data security against unauthorized access and breaches. Our investigation revolves around the vulnerabilities stemming from distributed links in cloud storage, shedding light on the paramount importance of safeguarding crucial commercial records. These challenges encompass the menace posed by both external attackers and unscrupulous customers, amplified within the complex landscape of multi-tenant architectures. This work presents the Secure-Cloud-Guard algorithm to achieve these goals—a multifaceted approach integrating encryption, biometric authentication, and MAC address security mechanisms. The Secure-Cloud-Guard algorithm, rooted in the user-centric paradigm, enhances data protection in cloud storage environments by orchestrating multiple layers of security. The algorithm’s simulation involves thorough evaluation through encryption performance analysis, biometric authentication testing, and MAC address security validation. The simulation results reveal the effectiveness of our proposed algorithm. Encryption performance metrics showcase the encryption throughput and latency, thereby gauging the efficiency of the encryption process. The biometric authentication simulation calculates the false acceptance rate (FAR) to determine the algorithm’s accuracy and false rejection rate (FRR). The simulation of MAC address security illustrates the algorithm’s ability to authenticate devices through MAC addresses, providing insights into its authentication success rate (ASR). In conclusion, an, aligning with user-centric approaches and incorporating advanced mechanisms, such as encryption, biometric authentication, MAC address security, contribute to the ongoing efforts of fortifying the security landscape of cloud storage and computingAbstract
How to Cite
Downloads
Similar Articles
- Sampa Mondal, Nilanjana Chatterjee, Baibaswata Bhattacharjee, Positive impact of using α-Fe2O3 nanoparticles as dietary supplements on some hematological parameters of an economically important minor carp Labeo bata (Hamilton, 1822) , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Menaha, J. Lavanya, Crop yield prediction in diverse environmental conditions using ensemble learning , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Deepa Ramachandran VR VR, Kamalraj N, Hybrid deep segmentation architecture using dual attention U-Net and Mask-RCNN for accurate detection of pests, diseases, and weeds in crops , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Mohit Kalra, Arpan Nautiyal, Krishnapal Singh, Health Assessment of Buksa Tribe: Exploring CSR Models for Indigenous Community Empowerment in Ramnagar Block, Nainital District , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Nagendra Kumar Yadav, IMPACTS OF MALATHION ON BIO-CHEMICAL CHANGES IN FRESHWATER FISH CHANNA PUNCTATUS UNDER LABORATORY CONDITIONS , The Scientific Temper: Vol. 9 No. 1&2 (2018): The Scientific Temper
- Temesgen Asfaw, Customer churn prediction using machine-learning techniques in the case of commercial bank of Ethiopia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Abbasova Sona Jamal, Aliyev Sabit Shakir, Mahmudov Elmir Heydar, Museyibli Emin Bakir, Nadirkhanova Dilshat Adalat, Econometric analysis of grain yields (using the example of the Republic of Azerbaijan) , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Bhaskarjyoti Talukdar, Bandana Sharma, Prognostic Factors and Survival Outcomes in Esophageal Cancer Patients from North-East India: A Hospital-Based Cohort Study Using Log-Rank Test and Binary Logistic Regression Analysis , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Roopshree Banchode, Sai Pranathi Bhallamudi, S. P. Kanchana, Evaluation of the Quality of Commonly Used Edible Oils and The Effects of Frying , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- Minas M. Ali, Farah H. Alenezi, Nora F. Alfayyadh, Sara Y. Alhassoun, Rahaf M. Alanzi, Waseem Radwan, Conservative esthetic dentistry in Riyadh – Saudi Arabia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 37 38 39 40 41 42 43 44 45 46 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- J. M. Aslam, K. M. Kumar, Enhancing security of cloud using static IP techniques , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper

