Abstract

With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These techniques do not completely serve the purpose in protecting data. The Obfuscation techniques come to rescue for protecting data from malicious attacks. This paper proposes an obfuscation technique to encrypt the desired data type on the cloud providing more protection from unknown hackers. The experimental results show that the time taken for obfuscation is low and the confidentiality percentage is high when compared with existing techniques.

Highlights

  • We are in the middle of an insurgency in cloud computing

  • Our approach is to protect data confidentiality from service providers, and to ensure that service providers cannot tamper the data stored in cloud environments

  • Several important problems in encryption process are resolved through data obfuscation method

Read more

Summary

Introduction

We are in the middle of an insurgency in cloud computing. The rapid deployment in cloud gives tremendous advantages to cloud users. CC could be comprised as ‘3 4 5’, i.e., Three service models as SPI, namely Software as a service, Platform as a service, Infrastructure as a Service, Four deployment models as P2CH namely Private, Public, Community and Hybrid clouds and Five essential characteristics as on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service These essential characteristics promote lot of benefits in cloud computing utilization, working in various P2CH cloud environments, keeping SPI as base models. The base encoding, ASCII encoding and hexadecimal encoding are few examples for obfuscation where the data are converted into nonreadable format These examples are used in this paper for comparison with the proposed obfuscation technique.

Related Works
Motivation and Derivation
Objective
Methodology
Proposed Obfuscation Technique
Experimental Results
Obfuscation
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.