Oversight Crypto-Virtual Storage Application

Benjamin Mbenji*, G. Glorindal**
*-** DMI-St. John the Baptist University, Lilongwe, Malawi.
Periodicity:July - December'2023
DOI : https://doi.org/10.26634/jdf.1.2.20083

Abstract

The Oversight Crypto-Virtual Storage application is designed as a virtual storage solution aimed at curtailing crimes involving data, such as data theft and tampering. The application enables users to privately store files by creating an encrypted box. Data storage is available for a predetermined amount of time. Once this period ends, the user's Box of files will prompt the user to decide whether to extend the storage duration. If the user chooses not to renew their service, the box becomes accessible to everyone on the platform.

Keywords

Cloud Storage, Sakai-Kasahara Key Encryption Algorithm, Public Key Crypto System, Data Security, Data Confidentiality, Data Integrity, Secure Hashing Algorithm.

How to Cite this Article?

Mbenji, B., and Glorindal, G. (2023). Oversight Crypto-Virtual Storage Application. i-manager’s Journal on Digital Forensics & Cyber Security, 1(2), 20-25. https://doi.org/10.26634/jdf.1.2.20083

References

[2]. Bulusu, S., & Sudia, K. (2013). A Study on Cloud Computing Security Challenges (Master thesis, Blekinge Institute of Technology, Sweden).
[3]. KamalaKannan, T., Sharmila, K., Shanthi, M. C., & Devi, M. R. (2019). Study on cloud storage and its issues in cloud computing. International Journal of Management, Technology and Engineering, 9(1), 976-981.
[5]. Prakash, G. L., Prateek, D. M., & Singh, D. I. (2014). Data security algorithms for cloud storage system using cryptographic method. International Journal of Scientific & Engineering Research, 5(3), 54-61.
[7]. Srinivasamurthy, S., & Liu, D. Q. (2010, November). Survey on cloud computing security. In Proceedings of Conference on Cloud Computing, CloudCom, 10, 1-8.
[9]. Thwe, K. Z., & Khaing, P. P. (2015). Cloud Computing: Benefits and Limits on SPI Model (Doctoral dissertation, MERAL Portal, University of Computer Studies Mandalay).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 40 40 300
Online 40 40 300
Pdf & Online 40 40 300

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.