z-logo
open-access-imgOpen Access
Secure and Smart Monitoring of Sensitive Data in Cloud Computing using Effective Cryptographic Scheme
Author(s) -
Abhishek Kumar,
DR. T. Abdul Razak
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.a2094.109119
Subject(s) - cloud computing , computer science , encryption , computer security , cryptography , flexibility (engineering) , server , key (lock) , scheme (mathematics) , data transmission , computer network , operating system , mathematical analysis , statistics , mathematics
The advantage of storing infinite data without giving any attentiontothe available storage restrictions and the liberty that one possesses to use those data when needed from anywhere in the globe, makes cloud environment the most ideal technology. Cloud hadalso became the preferred platform for storing and transferring the intendeddata. Both individuals and organizations were much comfortable in letting their sensitive data across their own generated cloud environments. But apart from the advantages that the cloud environments have imparted, it also have its own limitations. Limitations like risk of maintaining user’s data privacy, integrity, confidentiality and safety were normally existing while using the cloud environments. Besides allof the above said challenges, transferring of data from organization to cloud servers was considered with major importancein many evolving works. Several algorithms and encryption techniques have been developed currently for securing the operation of data transmission. Along this way, this paper proposes a design for thecloud framework that guarantees secured data transmission to serverfrom the source. This paper utilizes an approach called Honey Bee algorithm for encrypting and decrypting the datato be transmitted to the server. This algorithm is basically an encryption scheme which provides flexibility againstthe potential attacks by delivering a reasonable-looking text. But, the reasonable-looking text is a kind ofplain text generated for every wrong key used by an attacker for decrypting the message. Here a count of five keys will be generatedby the PRNG algorithmright after matching the OTP keys, which will be thenrandomly sent to users. The generated five keys aredeployed to promote additional security by the operation of anonymizationagainst the intruderstrying to access the data while under transmission. Here, in this proposed methodology,user cannot view all of his/her information, whereas the admin can have the full privilege of viewing all information about a user.Furthermore, performance metrics such as Key generation time, Encryption time, Decryption time and Message time were taken for the performance analysis to validate the performance of this proposed methodology with the existing considered methodologies.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here