The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: Cloud provides virtual space for users to storage and maintains their data. It mainly helps small and medium scale industries to easy come up and achieve their IT requirements with minimum cost. Apart from this, it has many security related issues. To address the security issues, this paper proposes an enhanced security service algorithm using data obfuscation technique namely ESSAO. Methods/Analysis: The proposed algorithm is provided as a service to user from the cloud. It is based on data obfuscation technique and it obfuscates only the numerical data in the original data. It uses different mathematical methods to convert the original data into unintelligible data. Findings: Cloud provides this proposed ESSAO algorithm as a service to the users based on the demand. This algorithm is coded in Java and hosted in the cloud server for evaluation. ESSAO reduces the time taken for obfuscation and de-obfuscation. It also reduces the size of data after obfuscation. Each numerical value in the original data is converted into a single character value. Hence, the size of data is reduced. It minimizes the latency of data uploaded to cloud. Hence, it is easily adopted in the cloud environment. Obfuscated data in the cloud is not accessible to the cloud service providers or other users of cloud services. Hence, it maintains the security of data in the cloud. Novelty/Improvements: Addressing security to the cloud environment is difficult task. This proposed algorithm provides security to the data in the cloud. This work is more applicable to education, medical, govt. and etc. to secure their data in the cloud.

Keywords

Cloud Computing, De-obfuscation, Obfuscation, Security Service Algorithm.
User