Open Access Open Access  Restricted Access Subscription Access

A Proficient Two Level Security Contrivances for Storing Data in Cloud


Affiliations
1 Department of IT, St. Peter’s University, Chennai - 600082, Tamil Nadu, India
2 Department of CSE, Velammal Institute of Technology, Chennai - 601204, Tamil Nadu, India
 

Objectives: Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to convert the cipher text using a secretkey block cipher of 64-bits. This system is designed to increase security and to improve the transmission performance. Storage-cheating attack model and Privacy-cheating attack model are implemented to protect the data on cloud. Findings: This system increases security and improves transmission performance. The blowfish algorithm is secure against unauthorized attacks and runs faster than the popular existing algorithms. Storage-cheating attack model and Privacy-cheating attack model provides the data confidentiality for data stored in the cloud in higher way. Improvements: The system can be implemented in real cloud system in the future.

Keywords

Blowfish Algorithm, Cloud Computing, Data Storage in Cloud, Linguistic Steganography, Two Levels Security.
User

Abstract Views: 176

PDF Views: 0




  • A Proficient Two Level Security Contrivances for Storing Data in Cloud

Abstract Views: 176  |  PDF Views: 0

Authors

K. Anbazhagan
Department of IT, St. Peter’s University, Chennai - 600082, Tamil Nadu, India
R. Sugumar
Department of CSE, Velammal Institute of Technology, Chennai - 601204, Tamil Nadu, India

Abstract


Objectives: Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to convert the cipher text using a secretkey block cipher of 64-bits. This system is designed to increase security and to improve the transmission performance. Storage-cheating attack model and Privacy-cheating attack model are implemented to protect the data on cloud. Findings: This system increases security and improves transmission performance. The blowfish algorithm is secure against unauthorized attacks and runs faster than the popular existing algorithms. Storage-cheating attack model and Privacy-cheating attack model provides the data confidentiality for data stored in the cloud in higher way. Improvements: The system can be implemented in real cloud system in the future.

Keywords


Blowfish Algorithm, Cloud Computing, Data Storage in Cloud, Linguistic Steganography, Two Levels Security.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F138623