Abstract
The aim of the research is cloud security and privacy in order to attain efficient secure storage and secure computation in cloud computing. We suggest a signing method for secure storage and computation process in this study. The proposed hybrid blow fish algorithm is to develop the secure storage of file. Here blowfish algorithm is hybrid with improved particle swarm optimization technique for the intention of secure storage and computation. Blow fish algorithm is applied for encryption and decryption process of our proposed method. In this method inserting a renew key to the file, as if the policy time of the file is over it will routinely erase the file from the cloud server. So that the implemented method employed one renew key for the renewal process of file. Based on this, the executed method is accomplishing high security level. Our method will be implemented in Cloud simulator in the working platform of Java.
Highlights
Cloud computing is a promising technology to facilitate development of large-scale, on demand, flexible computing infrastructures (Piplode and Singh, 2012)." Cloud computing is one the most important and developing concept for both the developers and the users
Security issues have received attention in cloud computing and vehicular networks, we identify security challenges that are specific to VCs
Proposed method: We offer a method for secure storage and computation process
Summary
Cloud computing is a promising technology to facilitate development of large-scale, on demand, flexible computing infrastructures (Piplode and Singh, 2012)." Cloud computing is one the most important and developing concept for both the developers and the users. Cloud computing offers various services such as a user can outsource for performing his computation and save his data to cloud servers by using the Internet. Three security requirements are often considered: confidentiality, integrity and availability for most Internet service providers and cloud users (Zhao et al, 2014) This security has been divided to several parts and one of the most important parts is ensuring about the user authentication processes and managing accesses when users outsource sensitive data share on public or private cloud servers (Moghaddamet al., 2014). The correct records are returned only when searched with the exact keywords (Rujet al., 2014) It brought a lot of advantages especially in ubiquitous services where everybody can access computing services through Internet (Banyalet al., 2013)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have