SlideShare a Scribd company logo
1 of 14
Download to read offline
FINAL REVIEW
Storage Technologies
Under guidance of: Prof. S Bhavani
Paper topic – Ensuring Data security and Access to Data in Cloud
Storage
Arnab Saikia 15BIT0072
Kedar Kumar 15BIT0268
Abstract
Cloud Storage is a straightforward and
versatile approach to store, access, and
offer information over the Internet.
Distributed storage suppliers, for example,
Amazon Web Services claim and keep up
the system associated equipment and
programming, while you arrangement and
utilize what you require through a web
application.
Cloud storage is effective for information
storage. Clients' information are sent to the
cloud is to be put away in the open cloud
condition. Information put away in the cloud
storage may blend with other clients'
information. This will prompt the information
insurance issue in cloud storage. In the event
that the privacy of cloud information is
broken, at that point it will make loss of
information. Security of cloud storage is
guaranteed through privacy parameter. To
guarantee the privacy, the most well-known
utilized system is encryption. However,
encryption alone doesn't give greatest security
to the information in the cloud storage. To
have proficient cloud storage secrecy, this
paper utilizes encryption furthermore,
obfuscation as two unique systems to secure
the information in the cloud storage.
Encryption is the way toward changing over
the discernable content into garbled shape
utilizing a calculation and a key. Jumbling is
same like encryption. Jumbling is a procedure
which camouflages illicit clients by actualizing
a specific numerical capacity or utilizing
programming strategies. Based on the sort of
information, encryption and jumbling can be
connected. Encryption can be connected to
letter sets and alphanumeric sort of
information and jumbling can be connected to
a numeric sort of information. Applying
encryption and jumbling strategies on the
cloud information will give more insurance
against unapproved utilization. Classification
could be accomplished with a blend of
encryption and obfuscation
This paper proposes a proficient cloud storage
secrecy procedure by utilizing encryption and
obscurity strategy . Ordinarily, privacy is
guaranteed by encryption strategy, however
for the cloud condition encryption alone isn't
sufficient for information security. Encryption
is incorporated with obscurity procedure.
Obscurity strategy alone is likewise
insufficient to receive for finish classification
of information in cloud storage in light of the
fact that the client can discover values through
figuring out or by utilizing animal constrain
system, which may trade off cloud information
security
Introduction
Cloud computing provides scalable computing
resources as a service with Internet based
technologies. Assets are shared among
countless considering a lower cost of IT
proprietorship. At introduce, cloud computing
is generally talked about in the scholarly
community and industry. Virtualization,
disseminated processing innovation and so on,
cloud computing coordinates the registering,
storage, organizing and other computing
assets, and after that leases to clients. The
Cloud storage is intended for virtualized PC
condition. The cloud storage is executed
utilizing cloud processing that implies using
the product and equipment assets of the cloud
processing specialist co-op While there are
many points of interest of cloud processing,
the endeavours are as yet holding up to utilize
cloud processing, in view of the information
security issue of cloud processing isn't
comprehended totally. Cloud Storage gives a
virtual space to store mass information. Be that
as it may, the information proprietors have no
influence over their information. The cloud
supplier has full control on the client's
information. This influences the client's psyche
to thing about the information security in the
cloud. Information insurance in the cloud
storage is the center security issues.
Information security is worried about
information secrecy, honesty, confirmation,
accessibility thus on. Information secrecy
implies that exclusive approved people can
utilize the information. Information
uprightness alludes to data that has not been
altered or stays untouched. Verification alludes
to the way toward checking whether the
approaching client is approved or not.
Information accessibility alludes to the
capacity to certification to utilize information
in time when required and furthermore alludes
to the accessibility of cloud specialist co-op
on-request.
This paper proposes an effective cloud storage
secrecy method by utilizing encryption and
obfuscation technique. Typically, privacy is
guaranteed by encryption method, yet for the
cloud condition encryption alone isn't
sufficient for information security. Encryption
is incorporated with obfuscation technique.
Obscurity method alone is additionally
insufficient to receive for finish privacy of
information in cloud storage in light of the fact
that the client can discover values through
reverse engineering or by using brute force
technique, which may trade off cloud
information security. This paper utilizes
encryption and obfuscation in a coordinated
way to shield the information from the
attackers. In the proposed system, clients
ought to encode and jumble the information
whatever they need to send to the cloud
storage. Encryption and obfuscation could be
done from client's side.
ISSUES REGARDING CLOUD STORAGE
The greater part of the issues are with security
of the information in the cloud. Guaranteeing
this issue in the cloud storage is most huge for
the cloud utilization organizations. The
information is classified and accessible when it
is required.
TRUST
Information, when put away in the cloud,
needs not exclusively to be Secret yet in
addition ought to be exact each time it
recovered after transferred or an alteration.
There ought not be lost uprightness of the
information. This is a legitimate situation
when outsider Sadministrations are traded off
by the vindictive operators This can be here
and there hard to identify and can in some
cases prompt extensive data spillage before
being found.
Cloud Service supplier understandings.
Utilization of the cloud storage administration
will turn out to be even more a item advertise,
security would be required and be important to
separate specialist co-ops and frameworks.
Information history
One of the critical highlights with nearby
information storage is the nearness of metadata
highlights which enable clients to see the
history of an information question. This
enables the frameworks to give information
uprightness checks and rollback abilities when
a debasement or trade off is identified in the
framework.
Information Possession
This issue is around related to one of substitute
issues examined how to trust the data set away
on the organization provider. Exactly when
data is recouped from the authority center on
playing out a trustworthiness check, it is hard
to choose how the data was secured in the
master communities system
PROPOSED CONFIDENTIALLY
TECHNIQUE
Cloud figuring gives an effective storage
setting to store and recover the cloud clients
basic information. Guaranteeing information
security is an imperative part to cloud clients
and in addition cloud suppliers. This paper
utilizes the classification parameter to address
the information security problems. Encryption
and obscurity of cloud information is done in
the client side. The key utilized for encryption
calculation is produced in the client condition.
Some Basic Terminology of Encryption
plaintext - original message
ciphertext - coded message
cipher - algorithm for transforming plaintext to ciphertext
key - info used in cipher known only to sender/receiver
encipher (encrypt) - converting plaintext to ciphertext
ALGORITHM1
Ceaser cipher
This mathematical description uses modulo
(clock) arithmetic. Here, when you reach Z
you go back to A and start again. Mod 26
implies that when you reach 26, you use 0
instead (ie the letter after Z, or 25 + 1 goes to
A or 0).
Example: howdy (7,14,22,3,24) encrypted
using key f (ie a shift of 5) is MTBID
Formula used here
Encryption:c = E(p) = (p + k) mod (26)
Decryption :p = D(c) = (c – k) mod (26)
ALGORITHM2
Playfair cipher
One way to deal with enhancing security was
to encode different letters. The best-known
various letter encryption figure is the Playfair,
which regards digrams in the plaintext as
single units and makes an interpretation of
these units into ciphertext digrams. The
Playfair calculation depends on the utilization
of a 5x5 network of letters developed utilizing
a catchphrase. The tenets for filling in this 5x5
lattice are: L to R, through and through, first
with catchphrase after copy letters have been
evacuated, and after that with the remain
letters, with I/J utilized as a solitary letter
Here monarchy word is taken as example to demonstrate
Plaintext is scrambled two letters at a time,according to the principles as appeared. Note how you
wrap from right side back to left, or from base back to top.
1. if a couple is a rehashed letter, embed a filler like 'X', eg. "swell" encodes as "ba lx lo on"
2. if the two letters fall in a similar column, supplant each with letter to right (wrapping back to
begin from end), eg. "ar" scrambles as "RM"
3. if the two letters fall in a similar segment, supplant each with the letter beneath it (again
wrapping to top from base), eg. "mu" encodes to "CM"
4. generally each letter is supplanted by the one in its line in the segment of the other letter of
the match, eg. "hs" scrambles to "BP", and "ea" to "IM" or "JM" (as wanted)
Decoding obviously works precisely in turn around.
ALGORITHM3
Vignere cipher
The best known, and one of the least difficult,
such calculations is alluded to as the Vigenère
figure, where the arrangement of related
monoalphabetic substitution rules comprises of
the 26 Caesar figures, with movements of 0
through 25. Each figure is indicated by a key
letter, which is the ciphertext letter that
substitutes for the plaintext letter 'an', and
which are each utilized as a part of turn, as
appeared next.
CODES FOR ENCRYPTION:
DESCRIPTION:
The Vigenere Cipher which was proposed
by Blaise Vigenere in sixteenth century, is
a polyalphabetic substitution where every
section of table analyses to a Caesar
Cipher. The main push is a move of 0, the
second line is a move of 1, and the last line
is a move of 25. The Vigenere Cipher uses
the table together with watchword to
encipher message.
OUTPUT SCREENSHOT:
CODE (C++):
#include <iostream>
#include <string>
using namespace std;
class Vigenere
{
public:
string key;
Vigenere(string key)
{
for(int i = 0; i < key.size(); i++)
{
if(key[i] >= 'A' && key[i] <= 'Z')
this->key += key[i];
else if(key[i] >= 'a' && key[i] <= 'z')
this->key += key[i] + 'A' - 'a';
}
}
string encrypt(string text)
{
string out;
for(int i = 0, j = 0; i<text.length(); i++)
{
char c = text[i];
if(c >= 'a' && c <= 'z')
c += 'A' - 'a';
else if(c < 'A' || c > 'Z')
continue;
out += (c + key[j] - 2*'A') % 26 + 'A';
j = (j+1) % key.length();
}
return out;
}
string decrypt(string text)
{
string out;
for(int i = 0, j = 0; i < text.length(); i++)
{
char c = text[i];
if(c >= 'a' && c <= 'z')
c += 'A' - 'a';
else if(c < 'A' || c > 'Z')
continue;
out += (c - key[j] + 26) % 26 + 'A';
j = (j+1) % key.length();
}
return out;
}
};
int main()
{
Vigenere cipher("VIGENERECIPHER");
string original = "The quick brown fox jumps over the lazy dog";
string encrypted = cipher.encrypt(original);
string decrypted = cipher.decrypt(encrypted);
cout<<original<<endl;
cout<<"Encrypted: "<<encrypted<<endl;
cout<<"Decrypted: "<<decrypted<<endl;
}
CEASER CIPHER ENCRYPTION CODE
OUTPUT SCREENSHOT
CODE FOR CAESAR CIPHER:
#include <iostream>
#include <string>
using namespace std;
char cipher(char);
char decipher(char);
int main()
{
int x;
string input;
cout<<"Select 1 for Cipher, 2 for Decipher"<<endl;
cin>>x;
do
{
if (x=1)
{
getline(cin,input);
string output = "";
for (int i= 0; i < input.length(); i++)
{
output += cipher(input[i]);
}
cout<<output<<endl;
}
else if (x=2)
{
getline(cin,input);
string output = "";
for (int i= 0; i < input.length(); i++)
{
output += decipher(input[i]);
}
cout<<output<<endl;
}
}
while (input.length() ==0);
}
char cipher(char c)
{
if(isalpha(c))
{
c=(c+3);
}
return c;
}
char decipher(char d)
{
if(isalpha(d))
{
d=(d-3);
}
return d;
CONCLUSION
Cloud processing is gainful registering
administrations to an individual and venture
clients. In any case, because of some of
security issue in it, individuals may be hesitant
to utilize it. Once the issues are settled, cloud
figuring will be the trillion dollar business in
the processing scene. The Data storage on un-
trusted cloud makes information security as a
testing issue. Information security in the cloud
is guaranteed by the classification of touchy
information ought to be upheld on Cloud
storage benefit suppliers. This paper proposed
a cryptographic procedure which is connected
to address this issue. Scrambled information
are put away on storage servers while mystery
key(s) are held by information proprietor;
access to the client is allowed by issuing the
comparing information decoding keys.
So all in all we have shown how to
encapsulate data in cloud storage. This
security problem is one of the most
problematic issue in todays time. Hence it is
really very important to secure data in cloud
.
References
1 Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers
Guoxin Liu; Haiying Shen
IEEE/ACM Transactions on Networking
Year: 2017, Volume: 25, Issue: 4
Pages: 2498 - 2513
IEEE Journals & Magazines
2.Location Privacy Attacks and Defenses in Cloud-Enabled Internet of Vehicles.Jiawen Kang, Rong
Yu, Xumin Huang, Magnus Jonsson, Hanna Bogucka, Stein Gjessing, and Yan Zhang. IEEE
Journals & Magazines
3. DATA ATTACKS ON CLOUD STORAGE
High Performance Computing and Communications; IEEE 14th International Conference on Smart
City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
4. Data Security Enhancement in Public Cloud Storage Using Data Obfuscation and Steganography
B Fathima Mary, DI George Amalarethinam
5. A Server Side Encryption for Cloud Storage with Federation Sharing in Hybrid Cloud Environment
C. Gopinaath, C.Kiruthika
6 Accelerated encryption algorithms for secure storage and processing in the cloud
Atta Badii; Ryan Faulkner; Rajkumar Raval; Cornelius Glackin; GĂ©rard Chollet
2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)
7.Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage
Youngjoo Shin; Dongyoung Koo; Joobeom Yun; Junbeom Hur
IEEE Transactions on Services Computing

More Related Content

What's hot

IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryptionijcisjournal
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...IRJET Journal
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534IJRAT
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...MajedahAlkharji
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
 
Enhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC AlgorithmEnhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC Algorithmijtsrd
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsIaetsd Iaetsd
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
The Champion Supervisor
The Champion SupervisorThe Champion Supervisor
The Champion SupervisorHassan Rizwan
 
Indocrypt11
Indocrypt11Indocrypt11
Indocrypt11Roy D'Souza
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computingVenkat Projects
 

What's hot (20)

IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
Enhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC AlgorithmEnhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC Algorithm
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
 
Report dna
Report dnaReport dna
Report dna
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
The Champion Supervisor
The Champion SupervisorThe Champion Supervisor
The Champion Supervisor
 
552 556
552 556552 556
552 556
 
Indocrypt11
Indocrypt11Indocrypt11
Indocrypt11
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
 

Similar to Storage final rev

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionAudit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionKamal Spring
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data securitySaranSwathi1
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Rishikesh Pathak
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 

Similar to Storage final rev (20)

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
H1803035056
H1803035056H1803035056
H1803035056
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionAudit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
C017421624
C017421624C017421624
C017421624
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 

More from Kedar Kumar

Data mining final report
Data mining final reportData mining final report
Data mining final reportKedar Kumar
 
Big data project
Big data projectBig data project
Big data projectKedar Kumar
 
.net programming using asp.net to make web project
 .net programming using asp.net to make web project .net programming using asp.net to make web project
.net programming using asp.net to make web projectKedar Kumar
 
educational website report
educational website reporteducational website report
educational website reportKedar Kumar
 
Wireless multimedia sensor networking
Wireless multimedia sensor networkingWireless multimedia sensor networking
Wireless multimedia sensor networkingKedar Kumar
 
Combinatorial testing
Combinatorial testingCombinatorial testing
Combinatorial testingKedar Kumar
 
Combinatorial testing ppt
Combinatorial testing pptCombinatorial testing ppt
Combinatorial testing pptKedar Kumar
 

More from Kedar Kumar (7)

Data mining final report
Data mining final reportData mining final report
Data mining final report
 
Big data project
Big data projectBig data project
Big data project
 
.net programming using asp.net to make web project
 .net programming using asp.net to make web project .net programming using asp.net to make web project
.net programming using asp.net to make web project
 
educational website report
educational website reporteducational website report
educational website report
 
Wireless multimedia sensor networking
Wireless multimedia sensor networkingWireless multimedia sensor networking
Wireless multimedia sensor networking
 
Combinatorial testing
Combinatorial testingCombinatorial testing
Combinatorial testing
 
Combinatorial testing ppt
Combinatorial testing pptCombinatorial testing ppt
Combinatorial testing ppt
 

Recently uploaded

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

Storage final rev

  • 1. FINAL REVIEW Storage Technologies Under guidance of: Prof. S Bhavani Paper topic – Ensuring Data security and Access to Data in Cloud Storage Arnab Saikia 15BIT0072 Kedar Kumar 15BIT0268 Abstract Cloud Storage is a straightforward and versatile approach to store, access, and offer information over the Internet. Distributed storage suppliers, for example, Amazon Web Services claim and keep up the system associated equipment and programming, while you arrangement and utilize what you require through a web application. Cloud storage is effective for information storage. Clients' information are sent to the cloud is to be put away in the open cloud condition. Information put away in the cloud storage may blend with other clients' information. This will prompt the information insurance issue in cloud storage. In the event that the privacy of cloud information is broken, at that point it will make loss of information. Security of cloud storage is guaranteed through privacy parameter. To guarantee the privacy, the most well-known utilized system is encryption. However, encryption alone doesn't give greatest security to the information in the cloud storage. To have proficient cloud storage secrecy, this paper utilizes encryption furthermore, obfuscation as two unique systems to secure the information in the cloud storage. Encryption is the way toward changing over the discernable content into garbled shape utilizing a calculation and a key. Jumbling is same like encryption. Jumbling is a procedure which camouflages illicit clients by actualizing a specific numerical capacity or utilizing programming strategies. Based on the sort of information, encryption and jumbling can be connected. Encryption can be connected to letter sets and alphanumeric sort of information and jumbling can be connected to a numeric sort of information. Applying encryption and jumbling strategies on the
  • 2. cloud information will give more insurance against unapproved utilization. Classification could be accomplished with a blend of encryption and obfuscation This paper proposes a proficient cloud storage secrecy procedure by utilizing encryption and obscurity strategy . Ordinarily, privacy is guaranteed by encryption strategy, however for the cloud condition encryption alone isn't sufficient for information security. Encryption is incorporated with obscurity procedure. Obscurity strategy alone is likewise insufficient to receive for finish classification of information in cloud storage in light of the fact that the client can discover values through figuring out or by utilizing animal constrain system, which may trade off cloud information security Introduction Cloud computing provides scalable computing resources as a service with Internet based technologies. Assets are shared among countless considering a lower cost of IT proprietorship. At introduce, cloud computing is generally talked about in the scholarly community and industry. Virtualization, disseminated processing innovation and so on, cloud computing coordinates the registering, storage, organizing and other computing assets, and after that leases to clients. The Cloud storage is intended for virtualized PC condition. The cloud storage is executed utilizing cloud processing that implies using the product and equipment assets of the cloud processing specialist co-op While there are many points of interest of cloud processing, the endeavours are as yet holding up to utilize cloud processing, in view of the information security issue of cloud processing isn't comprehended totally. Cloud Storage gives a virtual space to store mass information. Be that as it may, the information proprietors have no influence over their information. The cloud supplier has full control on the client's information. This influences the client's psyche to thing about the information security in the cloud. Information insurance in the cloud
  • 3. storage is the center security issues. Information security is worried about information secrecy, honesty, confirmation, accessibility thus on. Information secrecy implies that exclusive approved people can utilize the information. Information uprightness alludes to data that has not been altered or stays untouched. Verification alludes to the way toward checking whether the approaching client is approved or not. Information accessibility alludes to the capacity to certification to utilize information in time when required and furthermore alludes to the accessibility of cloud specialist co-op on-request. This paper proposes an effective cloud storage secrecy method by utilizing encryption and obfuscation technique. Typically, privacy is guaranteed by encryption method, yet for the cloud condition encryption alone isn't sufficient for information security. Encryption is incorporated with obfuscation technique. Obscurity method alone is additionally insufficient to receive for finish privacy of information in cloud storage in light of the fact that the client can discover values through reverse engineering or by using brute force technique, which may trade off cloud information security. This paper utilizes encryption and obfuscation in a coordinated way to shield the information from the attackers. In the proposed system, clients ought to encode and jumble the information whatever they need to send to the cloud storage. Encryption and obfuscation could be done from client's side. ISSUES REGARDING CLOUD STORAGE The greater part of the issues are with security of the information in the cloud. Guaranteeing this issue in the cloud storage is most huge for the cloud utilization organizations. The information is classified and accessible when it is required. TRUST Information, when put away in the cloud, needs not exclusively to be Secret yet in addition ought to be exact each time it recovered after transferred or an alteration. There ought not be lost uprightness of the information. This is a legitimate situation when outsider Sadministrations are traded off by the vindictive operators This can be here and there hard to identify and can in some cases prompt extensive data spillage before being found. Cloud Service supplier understandings. Utilization of the cloud storage administration will turn out to be even more a item advertise, security would be required and be important to separate specialist co-ops and frameworks. Information history One of the critical highlights with nearby information storage is the nearness of metadata highlights which enable clients to see the history of an information question. This enables the frameworks to give information uprightness checks and rollback abilities when a debasement or trade off is identified in the framework. Information Possession This issue is around related to one of substitute issues examined how to trust the data set away on the organization provider. Exactly when data is recouped from the authority center on playing out a trustworthiness check, it is hard to choose how the data was secured in the master communities system
  • 4. PROPOSED CONFIDENTIALLY TECHNIQUE Cloud figuring gives an effective storage setting to store and recover the cloud clients basic information. Guaranteeing information security is an imperative part to cloud clients and in addition cloud suppliers. This paper utilizes the classification parameter to address the information security problems. Encryption and obscurity of cloud information is done in the client side. The key utilized for encryption calculation is produced in the client condition. Some Basic Terminology of Encryption plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext
  • 5. ALGORITHM1 Ceaser cipher This mathematical description uses modulo (clock) arithmetic. Here, when you reach Z you go back to A and start again. Mod 26 implies that when you reach 26, you use 0 instead (ie the letter after Z, or 25 + 1 goes to A or 0). Example: howdy (7,14,22,3,24) encrypted using key f (ie a shift of 5) is MTBID Formula used here Encryption:c = E(p) = (p + k) mod (26) Decryption :p = D(c) = (c – k) mod (26) ALGORITHM2 Playfair cipher One way to deal with enhancing security was to encode different letters. The best-known various letter encryption figure is the Playfair, which regards digrams in the plaintext as single units and makes an interpretation of these units into ciphertext digrams. The Playfair calculation depends on the utilization of a 5x5 network of letters developed utilizing a catchphrase. The tenets for filling in this 5x5 lattice are: L to R, through and through, first with catchphrase after copy letters have been evacuated, and after that with the remain letters, with I/J utilized as a solitary letter Here monarchy word is taken as example to demonstrate Plaintext is scrambled two letters at a time,according to the principles as appeared. Note how you wrap from right side back to left, or from base back to top.
  • 6. 1. if a couple is a rehashed letter, embed a filler like 'X', eg. "swell" encodes as "ba lx lo on" 2. if the two letters fall in a similar column, supplant each with letter to right (wrapping back to begin from end), eg. "ar" scrambles as "RM" 3. if the two letters fall in a similar segment, supplant each with the letter beneath it (again wrapping to top from base), eg. "mu" encodes to "CM" 4. generally each letter is supplanted by the one in its line in the segment of the other letter of the match, eg. "hs" scrambles to "BP", and "ea" to "IM" or "JM" (as wanted) Decoding obviously works precisely in turn around.
  • 7. ALGORITHM3 Vignere cipher The best known, and one of the least difficult, such calculations is alluded to as the Vigenère figure, where the arrangement of related monoalphabetic substitution rules comprises of the 26 Caesar figures, with movements of 0 through 25. Each figure is indicated by a key letter, which is the ciphertext letter that substitutes for the plaintext letter 'an', and which are each utilized as a part of turn, as appeared next. CODES FOR ENCRYPTION: DESCRIPTION: The Vigenere Cipher which was proposed by Blaise Vigenere in sixteenth century, is a polyalphabetic substitution where every section of table analyses to a Caesar Cipher. The main push is a move of 0, the second line is a move of 1, and the last line is a move of 25. The Vigenere Cipher uses the table together with watchword to encipher message.
  • 8. OUTPUT SCREENSHOT: CODE (C++): #include <iostream> #include <string> using namespace std; class Vigenere { public: string key; Vigenere(string key) { for(int i = 0; i < key.size(); i++) { if(key[i] >= 'A' && key[i] <= 'Z')
  • 9. this->key += key[i]; else if(key[i] >= 'a' && key[i] <= 'z') this->key += key[i] + 'A' - 'a'; } } string encrypt(string text) { string out; for(int i = 0, j = 0; i<text.length(); i++) { char c = text[i]; if(c >= 'a' && c <= 'z') c += 'A' - 'a'; else if(c < 'A' || c > 'Z') continue; out += (c + key[j] - 2*'A') % 26 + 'A'; j = (j+1) % key.length(); } return out; } string decrypt(string text) { string out; for(int i = 0, j = 0; i < text.length(); i++) { char c = text[i];
  • 10. if(c >= 'a' && c <= 'z') c += 'A' - 'a'; else if(c < 'A' || c > 'Z') continue; out += (c - key[j] + 26) % 26 + 'A'; j = (j+1) % key.length(); } return out; } }; int main() { Vigenere cipher("VIGENERECIPHER"); string original = "The quick brown fox jumps over the lazy dog"; string encrypted = cipher.encrypt(original); string decrypted = cipher.decrypt(encrypted); cout<<original<<endl; cout<<"Encrypted: "<<encrypted<<endl; cout<<"Decrypted: "<<decrypted<<endl; } CEASER CIPHER ENCRYPTION CODE
  • 11. OUTPUT SCREENSHOT CODE FOR CAESAR CIPHER: #include <iostream> #include <string> using namespace std; char cipher(char); char decipher(char); int main() { int x; string input; cout<<"Select 1 for Cipher, 2 for Decipher"<<endl; cin>>x; do { if (x=1) { getline(cin,input); string output = ""; for (int i= 0; i < input.length(); i++) { output += cipher(input[i]); } cout<<output<<endl; } else if (x=2) {
  • 12. getline(cin,input); string output = ""; for (int i= 0; i < input.length(); i++) { output += decipher(input[i]); } cout<<output<<endl; } } while (input.length() ==0); } char cipher(char c) { if(isalpha(c)) { c=(c+3); } return c; } char decipher(char d) { if(isalpha(d)) { d=(d-3); } return d; CONCLUSION Cloud processing is gainful registering administrations to an individual and venture clients. In any case, because of some of security issue in it, individuals may be hesitant to utilize it. Once the issues are settled, cloud figuring will be the trillion dollar business in the processing scene. The Data storage on un- trusted cloud makes information security as a testing issue. Information security in the cloud is guaranteed by the classification of touchy information ought to be upheld on Cloud storage benefit suppliers. This paper proposed a cryptographic procedure which is connected to address this issue. Scrambled information are put away on storage servers while mystery key(s) are held by information proprietor; access to the client is allowed by issuing the comparing information decoding keys. So all in all we have shown how to encapsulate data in cloud storage. This security problem is one of the most problematic issue in todays time. Hence it is really very important to secure data in cloud .
  • 13. References 1 Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers Guoxin Liu; Haiying Shen IEEE/ACM Transactions on Networking Year: 2017, Volume: 25, Issue: 4 Pages: 2498 - 2513 IEEE Journals & Magazines 2.Location Privacy Attacks and Defenses in Cloud-Enabled Internet of Vehicles.Jiawen Kang, Rong Yu, Xumin Huang, Magnus Jonsson, Hanna Bogucka, Stein Gjessing, and Yan Zhang. IEEE Journals & Magazines 3. DATA ATTACKS ON CLOUD STORAGE High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) 4. Data Security Enhancement in Public Cloud Storage Using Data Obfuscation and Steganography B Fathima Mary, DI George Amalarethinam 5. A Server Side Encryption for Cloud Storage with Federation Sharing in Hybrid Cloud Environment C. Gopinaath, C.Kiruthika 6 Accelerated encryption algorithms for secure storage and processing in the cloud
  • 14. Atta Badii; Ryan Faulkner; Rajkumar Raval; Cornelius Glackin; GĂ©rard Chollet 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP) 7.Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage Youngjoo Shin; Dongyoung Koo; Joobeom Yun; Junbeom Hur IEEE Transactions on Services Computing