Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 48, Pages: 1-5
K. Anbazhagan1 * and R. Sugumar2
1 Department of IT, St. Peter’s University, Chennai - 600082, Tamil Nadu, India; [email protected]
2 Department of CSE, Velammal Institute of Technology, Chennai - 601204, Tamil Nadu, India
Objectives: Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to convert the cipher text using a secretkey block cipher of 64-bits. This system is designed to increase security and to improve the transmission performance. Storage-cheating attack model and Privacy-cheating attack model are implemented to protect the data on cloud. Findings: This system increases security and improves transmission performance. The blowfish algorithm is secure against unauthorized attacks and runs faster than the popular existing algorithms. Storage-cheating attack model and Privacy-cheating attack model provides the data confidentiality for data stored in the cloud in higher way. Improvements: The system can be implemented in real cloud system in the future.
Keywords: Blowfish Algorithm, Cloud Computing, Data Storage in Cloud, Linguistic Steganography, Two Levels Security
Subscribe now for latest articles and news.