Abstract

The aim of the research is cloud security and privacy in order to attain efficient secure storage and secure computation in cloud computing. We suggest a signing method for secure storage and computation process in this study. The proposed hybrid blow fish algorithm is to develop the secure storage of file. Here blowfish algorithm is hybrid with improved particle swarm optimization technique for the intention of secure storage and computation. Blow fish algorithm is applied for encryption and decryption process of our proposed method. In this method inserting a renew key to the file, as if the policy time of the file is over it will routinely erase the file from the cloud server. So that the implemented method employed one renew key for the renewal process of file. Based on this, the executed method is accomplishing high security level. Our method will be implemented in Cloud simulator in the working platform of Java.

Highlights

  • Cloud computing is a promising technology to facilitate development of large-scale, on demand, flexible computing infrastructures (Piplode and Singh, 2012)." Cloud computing is one the most important and developing concept for both the developers and the users

  • Security issues have received attention in cloud computing and vehicular networks, we identify security challenges that are specific to VCs

  • Proposed method: We offer a method for secure storage and computation process

Read more

Summary

INTRODUCTION

Cloud computing is a promising technology to facilitate development of large-scale, on demand, flexible computing infrastructures (Piplode and Singh, 2012)." Cloud computing is one the most important and developing concept for both the developers and the users. Cloud computing offers various services such as a user can outsource for performing his computation and save his data to cloud servers by using the Internet. Three security requirements are often considered: confidentiality, integrity and availability for most Internet service providers and cloud users (Zhao et al, 2014) This security has been divided to several parts and one of the most important parts is ensuring about the user authentication processes and managing accesses when users outsource sensitive data share on public or private cloud servers (Moghaddamet al., 2014). The correct records are returned only when searched with the exact keywords (Rujet al., 2014) It brought a lot of advantages especially in ubiquitous services where everybody can access computing services through Internet (Banyalet al., 2013)

LITERATURE REVIEW
OBJECTIVE
RESULTS AND DISCUSSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call