Achieving High Secure Data Storage in Cloud Computing

Abstract

Nowadays, cloud computing has attained great prominence due to various reasons for instance, on demand resource sharing and online storage of data. It is a collection of shared pool of information, resources that makes up a cloud. In this paper, emphasis is to provide a various encryption techniques and effective security solution and also to reduce cloud storage to reduce its overhead. The various security techniques over cloud platform and show analysis of protection by using various cryptographic techniques which is most useful and helpful in the information security. This technique is a two way secured data encryption system, which focus on the matters related to user’s privacy, authentication and accuracy. The security and performance of encryption algorithms must be balanced. This paper, encryption algorithms (AES, Blowfish, RSA) has been discussed to analyze the performance level of each algorithm.

Authors and Affiliations

S. Meena, Dr. N. Kowsalya

Keywords

Related Articles

Analytical Representation on Secure Mining in Horizontally Distributed Database

The security of the large database becomes a serious issue while sharing the data to the network against unauthorized access. However in order to provide the security many researchers cited the issue of Secured Multipar...

A Preview Paper on Hand Talk Glove

In general, people who can’t talk properly with others, who do not understand sign language. Even though those who do speak aloud properly have a “deaf voice” of which they are self-conscious and that can make them reti...

An Automatic Repelling System to Reduce Human Elephants Conflicts Using Sensors

In major areas, Human-Animal Conflict occurs due to the shortage of food and shelter. Due to the human population explosion and deforestation, forest areas were completely destroyed and this results in Human-Animal Conf...

Analysis on Security Evaluation of Pattern Classifiers under Attack

Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in ad...

Content Management System (CMS)

Content Management System (CMS) is a computer program that allows publishing, editing and modifying content as well as maintenance from a central interface. CMSs typically aim to avoid the need for hand coding but may s...

Download PDF file
  • EP ID EP24363
  • DOI -
  • Views 312
  • Downloads 9

How To Cite

S. Meena, Dr. N. Kowsalya (2017). Achieving High Secure Data Storage in Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24363