A Proficient Two Level Security Contrivances for Storing Data in Cloud

Indian Journal of Science and Technology 9 (48):1-5 (2016)
  Copy   BIBTEX

Abstract

Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to convert the cipher text using a secret-key block cipher of 64-bits. This system is designed to increase security and to improve the transmission performance. Storage-cheating attack model and Privacy-cheating attack model are implemented to protect the data on cloud. Findings: This system increases security and improves transmission performance. The blowfish algorithm is secure against unauthorized attacks and runs faster than the popular existing algorithms. Storage-cheating attack model and Privacy-cheating attack model provides the data confidentiality for data stored in the cloud in higher way. Improvements: The system can be implemented in real cloud system in the future.

Other Versions

No versions found

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).

Analytics

Added to PP
2025-02-15

Downloads
56 (#418,753)

6 months
56 (#100,630)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Predicting Insurance Charges Using Machine Learning (14th edition).Vivek Vishwakarma Smith Gholap - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (2):1460-1463.
Cloud Architecture Design Patterns: Best Practices for Scalable and Secure Systems.Nivisha Govindaraj Ram Nivas Duraisamy - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):691-697.
The Evolution of Cloud Computing: From Virtualization to Edge Computing.Ingale Amruta - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (2):453-458.
The Evolution of Immersive Technology: A Comparative Study of Augmented Reality (AR) and Virtual Reality (VR).A. Dhekane Onkar - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):1099-1106.
Data Cleaning and Preprocessing Techniques: Best Practices for Robust Data Analysis.Md Firoz Ahmed Sujan Chandra Roy - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (3):1538-1545.

View all 52 citations / Add more citations

References found in this work

No references found.

Add more references