Abstract
The advantage of storing infinite data without giving any attentiontothe available storage restrictions and the liberty that one possesses to use those data when needed from anywhere in the globe, makes cloud environment the most ideal technology. Cloud hadalso became the preferred platform for storing and transferring the intendeddata. Both individuals and organizations were much comfortable in letting their sensitive data across their own generated cloud environments. But apart from the advantages that the cloud environments have imparted, it also have its own limitations. Limitations like risk of maintaining user’s data privacy, integrity, confidentiality and safety were normally existing while using the cloud environments. Besides allof the above said challenges, transferring of data from organization to cloud servers was considered with major importancein many evolving works. Several algorithms and encryption techniques have been developed currently for securing the operation of data transmission. Along this way, this paper proposes a design for thecloud framework that guarantees secured data transmission to serverfrom the source. This paper utilizes an approach called Honey Bee algorithm for encrypting and decrypting the datato be transmitted to the server. This algorithm is basically an encryption scheme which provides flexibility againstthe potential attacks by delivering a reasonable-looking text. But, the reasonable-looking text is a kind ofplain text generated for every wrong key used by an attacker for decrypting the message. Here a count of five keys will be generatedby the PRNG algorithmright after matching the OTP keys, which will be thenrandomly sent to users. The generated five keys aredeployed to promote additional security by the operation of anonymizationagainst the intruderstrying to access the data while under transmission. Here, in this proposed methodology,user cannot view all of his/her information, whereas the admin can have the full privilege of viewing all information about a user.Furthermore, performance metrics such as Key generation time, Encryption time, Decryption time and Message time were taken for the performance analysis to validate the performance of this proposed methodology with the existing considered methodologies.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Engineering and Advanced Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.