Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/339420
Title: | A hybrid approach for data security in cloud data centres |
Researcher: | Prabhu, A |
Guide(s): | Usha, M |
Keywords: | Engineering and Technology Engineering Engineering Electrical and Electronic |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | A cloud is a replica of Information Technology facilities and in which, resources from the internet are utilized with the help of web-based applications to improve to the performance and storage facility. It has several advantages compared to conventional server connection method. The central concept of Cloud Computing is that every enterprise or individual cannot afford to spend a massive amount for data storage. With the increase in small and medium enterprises, mobile users have started to use the Cloud and hence, efficient and secured data storage has become a challenge. Various solutions have been proposed for data security, but still, there is a problem in security while storing and receiving data in a federated cloud environment. The Cloud computing environment cannot run without encryption algorithms. The encryption algorithm protects the network and cloud data. Similarly, storing the data for fast retrieval by finding the best cloud server for storing the data as well as for fast retrieval is also an important issue in cloud computing. In the present work, a hybrid approach has been proposed for providing security to the cloud servers. The Hybrid method has three phases, namely, Authentication Phase, Cloud Data encryption phase and optimal storage location finding phase. In the authentication phase, the user is verified and approved to access the cloud application as well as to encrypt the input file using the Blowfish algorithm. The given text input file is fragmented using pattern matching and encrypted by using the Blowfish algorithm Before encryption, the input data are grouped column-wise with the help of a pattern-matching algorithm. In this novel methodology, the encryption and decryption processes have been carried out by employing Blowfish algorithm. The process of merging Pattern matching and Blowfish algorithm named as Pat-fish method. The Bat algorithm is an optimization algorithm and it is employed to find the optimal server location to store the encrypted data. |
Pagination: | xviii,136 p. |
URI: | http://hdl.handle.net/10603/339420 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 197.89 kB | Adobe PDF | View/Open |
02_certificates.pdf | 255.64 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 568.56 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 262.22 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 277.08 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 259.11 kB | Adobe PDF | View/Open | |
07_contents.pdf | 479.47 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 278.38 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 113.2 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 280.4 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 384.95 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 477.98 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 850.47 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 715.86 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 997.18 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 132.67 kB | Adobe PDF | View/Open | |
17_references.pdf | 333.58 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 269.27 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 90.6 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: