Abstract

Cloud computing is an emergent part in the arena of IT. Nowadays, a good amount of fast, advanced and challenging technologies are available in cloud computing for accessing, sharing, and transmitting large data over the network. Along with this growth, the existence of data hackers and attackers has also increased. Every organization always seeks error free and secured data transmission over the cloud. Moreover, the users also expect their data, stored on to the cloud should be more secured, confidential, and authorized. The server stores the encrypted data and it is decrypted at client side. In this article, we proposed cryptographic mechanisms that verify the uniqueness of data stored at cloud is same as original data put by the client. Additionally, we have also explored the existing encryption procedures, namely, AES and Blowfish for the evaluation. Performance evaluation of the algorithms based on the parameters memory requirement, time complexity for dissimilar documents formats like Text, Images, Pdfs. Word documents and Movie clips etc. at different configurations for individual users is done. Key Words: Information Technology, Cloud Computing, Cryptography, Cloud Security, AES, Blowfish

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.