Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/339420
Title: A hybrid approach for data security in cloud data centres
Researcher: Prabhu, A
Guide(s): Usha, M
Keywords: Engineering and Technology
Engineering
Engineering Electrical and Electronic
University: Anna University
Completed Date: 2021
Abstract: A cloud is a replica of Information Technology facilities and in which, resources from the internet are utilized with the help of web-based applications to improve to the performance and storage facility. It has several advantages compared to conventional server connection method. The central concept of Cloud Computing is that every enterprise or individual cannot afford to spend a massive amount for data storage. With the increase in small and medium enterprises, mobile users have started to use the Cloud and hence, efficient and secured data storage has become a challenge. Various solutions have been proposed for data security, but still, there is a problem in security while storing and receiving data in a federated cloud environment. The Cloud computing environment cannot run without encryption algorithms. The encryption algorithm protects the network and cloud data. Similarly, storing the data for fast retrieval by finding the best cloud server for storing the data as well as for fast retrieval is also an important issue in cloud computing. In the present work, a hybrid approach has been proposed for providing security to the cloud servers. The Hybrid method has three phases, namely, Authentication Phase, Cloud Data encryption phase and optimal storage location finding phase. In the authentication phase, the user is verified and approved to access the cloud application as well as to encrypt the input file using the Blowfish algorithm. The given text input file is fragmented using pattern matching and encrypted by using the Blowfish algorithm Before encryption, the input data are grouped column-wise with the help of a pattern-matching algorithm. In this novel methodology, the encryption and decryption processes have been carried out by employing Blowfish algorithm. The process of merging Pattern matching and Blowfish algorithm named as Pat-fish method. The Bat algorithm is an optimization algorithm and it is employed to find the optimal server location to store the encrypted data.
Pagination: xviii,136 p.
URI: http://hdl.handle.net/10603/339420
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File197.89 kBAdobe PDFView/Open
02_certificates.pdf255.64 kBAdobe PDFView/Open
03_vivaproceedings.pdf568.56 kBAdobe PDFView/Open
04_bonafidecertificate.pdf262.22 kBAdobe PDFView/Open
05_abstracts.pdf277.08 kBAdobe PDFView/Open
06_acknowledgements.pdf259.11 kBAdobe PDFView/Open
07_contents.pdf479.47 kBAdobe PDFView/Open
08_listoftables.pdf278.38 kBAdobe PDFView/Open
09_listoffigures.pdf113.2 kBAdobe PDFView/Open
10_listofabbreviations.pdf280.4 kBAdobe PDFView/Open
11_chapter1.pdf384.95 kBAdobe PDFView/Open
12_chapter2.pdf477.98 kBAdobe PDFView/Open
13_chapter3.pdf850.47 kBAdobe PDFView/Open
14_chapter4.pdf715.86 kBAdobe PDFView/Open
15_chapter5.pdf997.18 kBAdobe PDFView/Open
16_conclusion.pdf132.67 kBAdobe PDFView/Open
17_references.pdf333.58 kBAdobe PDFView/Open
18_listofpublications.pdf269.27 kBAdobe PDFView/Open
80_recommendation.pdf90.6 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: