Open Access Open Access  Restricted Access Subscription Access

Magnified Cipher Block Chaining Mode using DES to Ensure Data Security in Cloud Computing


Affiliations
1 K L University, Green Fields, Vaddeswaram, Guntur-522008, Andhra Pradesh, India
 

Background/Objectives: The main objective is to provide security using Magnified Cipher Block Chaining mode-DES to ensure secure data on cloud. Methods: In this work we have to find how the data is converted into binary and splits into blocks of particular size. By using Magnified Cipher block chaining mode-DES we encrypt data and store into cloud. We send the key to the receiver then he/she access the data from the cloud and decrypt the data. By this methodology we can ensure high security because even cloud server cannot access data. Findings: In this research, many encryption and decryption algorithms like AES, DES, RSA, Cipher Block Chaining modes have been taken into account. By using the DES operation we proposed a magnified Cipher Block Chaining mode –DES to find out how the data is divided into blocks and how the DES operation will perform. In this work we also find out the several algorithms like AES, DES etc. DES algorithm has been designed to provide more secure because the data is to be perform 16 rounds for encryption and decryption. In our work we divide the data into blocks and encrypt the data using DES algorithm and sent to the next block depending on the midvalue+position. Like this all the blocks of the data are encrypted and decrypted. By this methodology we can provide more secure because we are storing the encrypted data in the cloud so that even cloud server cannot access. Improvement: In order to provide security we propose a Magnified Cipher Block Chaining mode using DES. On the basis of mid value + positions the data is encrypted and decrypted.

Keywords

Cipher Blocks Chaining, Cloud, Encryption, Decryption, Magnified, Security
User

Abstract Views: 207

PDF Views: 0




  • Magnified Cipher Block Chaining Mode using DES to Ensure Data Security in Cloud Computing

Abstract Views: 207  |  PDF Views: 0

Authors

D. Aruna kumari
K L University, Green Fields, Vaddeswaram, Guntur-522008, Andhra Pradesh, India
M. Chandrika
K L University, Green Fields, Vaddeswaram, Guntur-522008, Andhra Pradesh, India
B. Surekha Ratnam Bharadwaj
K L University, Green Fields, Vaddeswaram, Guntur-522008, Andhra Pradesh, India

Abstract


Background/Objectives: The main objective is to provide security using Magnified Cipher Block Chaining mode-DES to ensure secure data on cloud. Methods: In this work we have to find how the data is converted into binary and splits into blocks of particular size. By using Magnified Cipher block chaining mode-DES we encrypt data and store into cloud. We send the key to the receiver then he/she access the data from the cloud and decrypt the data. By this methodology we can ensure high security because even cloud server cannot access data. Findings: In this research, many encryption and decryption algorithms like AES, DES, RSA, Cipher Block Chaining modes have been taken into account. By using the DES operation we proposed a magnified Cipher Block Chaining mode –DES to find out how the data is divided into blocks and how the DES operation will perform. In this work we also find out the several algorithms like AES, DES etc. DES algorithm has been designed to provide more secure because the data is to be perform 16 rounds for encryption and decryption. In our work we divide the data into blocks and encrypt the data using DES algorithm and sent to the next block depending on the midvalue+position. Like this all the blocks of the data are encrypted and decrypted. By this methodology we can provide more secure because we are storing the encrypted data in the cloud so that even cloud server cannot access. Improvement: In order to provide security we propose a Magnified Cipher Block Chaining mode using DES. On the basis of mid value + positions the data is encrypted and decrypted.

Keywords


Cipher Blocks Chaining, Cloud, Encryption, Decryption, Magnified, Security



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i17%2F132853