SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 455
DATA DIVISION IN CLOUD FOR SECURED DATA STORAGE USING RSA
ALGORITHM
B. Rex Cyril1, DR.S. Britto Ramesh Kumar2
1Research Scholar and Assistant Professor, Department of Computer Science, St.Joseph’s College(Autonomous),
2Trichy, Tamilnadu, India2Asst.Professor, Department of Computer Science, St.joseph’s College(Autonomous)
Trichy, Tamilnadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Cloud place for storing is an arm where facts is
from far said (thing is true), managed, and backup. Cloud
computing is group of resources and services offered through
the net. Cloud services are handed over from facts middle's
placed throughout the earth. Cloud computing helps its users
by making ready machine-based resources via the net.
However, working well knowledge for computers system of
care for trade and strong encryption in the cloud is possible
and ready (to be used) through a number of cloud answers.
This paper aims at safe knowledge for computers place for
storing in cloud. Here we separate the facts in cloud for safe
place for storing using RSA algorithm. The user knowledge for
computers is encrypted using RSA and separated into number
times another gets in the way of and stored on different cloud
computers. The division of knowledge for computers in the
cloud general condition for safe knowledge for computers
place for storing gets done safety as well as right not to be
public to user facts and gives greater value to the doing a play
by copying techniques.
Keywords: Cloud Computing, Data Storage, Data security,
Data Encryption, Data Decryption
1. INTRODUCTION
Cloud computing is the most demanded
technologies used all over the earth. It provides all kind of
services for the users. One of the most readily seen arm
offered by cloud computing is cloud place for storing. Cloud
place for storing is simply a limited stretch of time that says
something about to on line space that you can use to store
your facts. In more solid way, cloud place for storing is an
arm design to be copied in which facts is said, managed and
backed up from far and made ready to users overa network.
In it undertakings, the cloud are nearby trends,i.eitispower
to moves computing and knowledge for computers away
from tabletop and able to be taken about PCs into greatly
sized facts insides. Sixty two parts of a hundred of
undertakings go to person in authority that in the middle of
it makes the majority of cloud using up decisions.43 parts of
a hundred of it teams are offering a self-helping great door-
way for way in to cloud arms, with an addition of 41 parts of
a hundred idea or getting greater, stronger, morecompletea
great door-way.
The statements of cloud computing on condition
that by National Institute of quality examples and
Technologist says that: Cloud computing is a design to be
copied for making able to right, on request network way in
to a shared card-player's money of configurable computing
resources (e.g. networks 3, servers, place for storing
applications and arms) that can be rapidly provisioned and
given out with least business managers hard work or arm
giver effect on one another. With the help of greatly sized
scale undertaking the net grows rapidly around the earth,
applications can now be handed over as services over the
net. As an outcome this overall price is made lower, less.
From the view of facts safety, Cloud computingputs
forward new questions safety being, saying violent behavior
for many Reasons. firstly, old and wise cryptographic early
persons for the knowledge for computers safety system of
care for trade cannot be directly took up becauseuserhasno
control over the facts under Cloudcomputing.Asanoutcome
of that verification of right knowledge for computers place
for storing in the cloud must be guided without clear and
detailed knowledge of the complete work facts. Secondly,
Cloud computing is not just a third group knowledge for
computers store house.The knowledgeforcomputersstored
in the cloud may be frequently changed knowledge by the
users, including insertion, thing taken out, modification,join
and so on. Last but not least, the placing of cloud computing
is powered by knowledge for computers middle'srunning in
at the same time, made distribution and worked together.
Recently, the importance of making certain the far
away, widely different facts true, good nature hasbeenhigh-
lighted by the different make observations works. These
expert ways of art and so on, which can be useful to make
certain the place for storing rightness cannot house all the
safety being, saying violent behavior in cloud knowledge for
computers place for storing, since they all are focusing on
single computer scenario. In this paper we offer a working
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 456
well way to safe knowledge for computers place for storing
in cloud. Here we separate the facts in cloud for safe place
for storing using RSA algorithm.
2. RELATED WORK
The survey [2] guided by Salt march news in the
third quarter of this year measured power being conscious
of Business technology experts including their important
questions in taking up Cloud, the drivers, how their
organization's map to use Cloud, the different stages of
Adoption, and the cloud flat structures, applications,persons
for whom one does work, roads and systems and place for
storing used. "While facts secretly and audit ability (24.5%)
topped the list of first obstacles for the use of cloud.
Computing technologies, doing a play state of not
being able to say before-hand (20.1%) appeared to be
another key cause dampening Adoption levels". knowledge
for computers get moved from one position to another
narrow part (of road) (17.5%) and facts lock-in (14.3%)
were next on the list of factors as stated by Respondents.
Cloud computing[4] provides the place for storing
and supports for getting work done by others of knowledge
for computers without having the nearby copy of facts or
records. However an importanthardquestionisto puta stop
to not with authority adjustments. But, for this it has need of
either facts copyingoron-demandcomputationofa purpose,
use (e.g. a number without thought of amount) over the
complete outsourced facts.
In text record distribution [1], the text record is
separated into the gets in the way of and goes away the text
record F unnecessarily across a group of made distribution
computers. Facts are stored in the encrypted form on the
computers. All the forceful operations like thing put in,
update, join and take out can be done on the facts gets in the
way of. As in agreement the changes in text record, factsgets
in the way of are separated and stored on the facts
computers again. While getting back the facts, the facts gets
in the way of separate records are merged and profit to the
user. To check the rightness of the text record, question
small things have been sending to the cloud place forstoring
system.
To make ready safety for cloud facts RSA Algorithm
[3] is used, RSA is the deterministic encryption algorithm. It
was undergone growth by Ron go back, aldi shamir, and Len
adleman at Mit and first made public in 1978[rivert-shamir-
adleman (RSA)]. In this design the level stretch of country
teaching book and cipher teaching book are complete
numbers, not parts between 0 and n-1 for some N. A of a
certain sort size for N is 1024 bits.
RSA algorithm[5]; In this careful way some
important safety services including key living-stage,
encryption and decryption are on condition that in Cloud
computing system. The main end, purpose is to safely store
and manage facts that are not controlled by the owner of the
facts. The facts are stored in cloud general condition Cloud
safety here is not answer to by making ready a RSA
algorithm.
3. PROBLEM STATEMENT
3.1 System Architecture:
In cloud knowledge for computers place forstoring,
a user stores his knowledge for computers through a cloud
Service giver into a pot of cloud computers, which are
running in an at the same time, worked together and made
distribution way Fig (1). Net structure connection provides
facilities to upload download and act the forceful operations
on facts text record. Checking to make certain System lets
the given authority user to get the way in to the cloud place
for storing. User checking tomakecertainway isdonebefore
to the place for storing and acts to get back. It provides the
facts right not to be public to the user. It also lets user to
change his outline. Place for keeping records one making
discovery in new country provides the selections to look for
a text record and act forceful operations. Withthesolidmass
operation, it provides different operations like bring to the
current state join and take out on one computer. We can
view the is in of the text record stored on the one computer.
With the upload thing for which selection is made, user can
upload the knowledge for computers text record from his
system on the cloud computers.Withthedownload(right of)
selection between, it will list down all the users text record,
and selected text record can be downloaded on users place.
Here encryption and decryption isdoneusingRSAalgorithm
RSA is a block cipher, in which every message is
mapped to an integer. RSA consists of Public-Key and
Private-Key. In our Cloud environment, Pubic-Key is known
to all, whereas Private-Key is known only to the user who
originally owns the data. Thus, encryption is done by the
Cloud service provider and decryption is done by the Cloud
user or consumer. Once the data is encrypted with the
Public-Key, it can be decrypted with the corresponding
Private-Key only.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 457
Authorized userClient Machine
Web Interface
Authentication system
Change profile File explorer Block operation
Upload file download
File distribution
RSA encryption
Token generation
Cloud
storage
Cloud
storage
Cloud
storage
RSA decryption
Merge
Fig-1: System Architecture for cloud storage
3.2 Design Goals:
Offered design is to make good at producing an
effect facts safety design to be copied which supports for
i)Data true, good nature to make certain the users facts is
right and stored in cloud computer. ii) Have an effect ongive
position of the computer on which facts has been made an
adjustment by not with authority user. iii) Support for the
forceful facts like join, take out, insert, bring to the current
state while making payment before work the same place for
storing rightness.
4. DATA SECURITY
Cloud possesses the security problem in Data
segregation, Data theft, unauthorized access, Uncleared
Owner and responsibility of Data Protection, Data Loss
conditions
Data security framework
Security[3] is the majorconcerntoaccessthedata in
cloud. Security involves protecting data from being lost,
destroyed or modified.
1) Protection of Data: Data can be protected from the
outside user by creating the security keys such as private
key.
2) Building Blocks: Mathematical and cryptographic
principles server as the building blocks of the security.
3) Integrity of data: while uploading the data the user can
verify the correctness of the integrity principles.
4) Accessing the Data: Due to the Encryption and
Decryption techniques data can be accessed securely.
5) Authentication: Authentication allows only authorized
user to access Data in cloud.
5. PROPOSED WORK
In our offered work, we are making separate the
facts in cloud for safe place for storing using RSA algorithm.
RSA algorithm [2] to encrypt the facts to make ready safety
so that only the had a part in user can way in it. By getting
the facts, we are not letting not with authority way in to it.
User facts are encrypted first and then it is stored in the
Cloud. When needed, user places a request for the facts for
the Cloud giver; Cloud giver makescertaintheuserandgives
the facts.
5.1 Data Division
F – The data file to be stored. We assume that F can
be denoted as a matrix of m equal-sized data vectors, each
consisting of l blocks. Data blocks are all well represented as
elements in Galois Field GF (2p) for p = 8 or 16. File is split
into fixed-size blocks which are stored on servers and all
blocks are replicated and dispersedoverdistributedservers.
We rely on this technique to disperse the data file F
redundantly across a set of n = m+ k distributed servers.File
data should be greater than or equal to the number of server
on which it is going to store.
Algorithm 1: File Distribution Preparation
Step1. Check the file’s data length greater than or equal to
the number of server. If it is blank file or the data length is
less, then prompt the message to the user.
Step 2. Generate the file matrix. The Generate_Matrix (file)
function divides the file into equal data vector length.
Data vectors are created dependingonthedistributionof the
file.
datavector_length=
If file_length mod n < > 0 then
datavector_length = datavector_length+1
This divides the file into n number of blocks. Vector1
contains the data bytes from 1 to datavector_length fromthe
file. Vector 2 contains the data bytes from the location of
datavector_length to (2 * datavector_length) and so on. Each
vector represents the data block of matrix of Galois Field.
Use the Vander monde matrix for the Matrix_Multiply ()
function. Construct A using Vander monde matrix defined
over GF (2w). For e.g. if we take 3x3 Vander monde matrix
defined over GF (24)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 458
Step 3. Perform Matrix_multiply(vector, A) operationoneach
data vector. Use g1, g2, g3…gm as data vector names.
sum = 0; count = 0;
For k 1 to File_length Do
For i 1 to datavector_length Do
sum = sum +vector[i] *A[count];
For all data vectors Do
End for
count = count + 1;
End For
End For
Step 4. Encryption is applied on each data vector and data
vectors are disperse on the distributed servers. The data
vector of a file is replicated on the cloud servers.
Fig-2: Distribution of File Stored on Cloud
5.2 Token Generation:
Before storing the knowledge forcomputersgivesdirections
to be taken on cloud computers, user pre-computes the
verification tokens [4]. These small things are used to check
the true, good nature of knowledge for computers stored on
cloud computers. Also these small things are used to give
position of the cloud computeronwhichfactshasbeenmade
an adjustment by the computer expert for pleasure. Before
facts division and going away text record user produces
small things on person facts gives directions to be taken.
When user wants to check the rightnessofthefacts,hesends
the text record thing taken to be the same to the cloud
computers. User may send physical acts offer on one facts
solid mass in addition. Upon letting into one's house
question small thing, each cloud computer works out the
things like money on the facts guide, and sends themtouser.
If the small things of users and worked out small thingsfrom
cloud computers are matched, then the facts is right. If the
small things are not matched, then an adjustment has been
done in the facts by not with authority user. This shows
cloud cut, make a division of is behaving badly.
Step1. Choose the parameter r for number of indices per
verification and pseudorandom function f,
pseudorandom Permutation function ϕ
Step2. Choose the parameters t, the number of tokens to
be generated and l the length of the data vector.
Step3. Chose α as a vector to compute the tokens and V to
store the tokens.
Step4. Read the file as byte array. Divide this byte array
into parts. Each part contains byte and
represents it into polynomial. (for example dividing byte
array in 3parts).
For j←1 to n Do
For i ← 1 to t Do α[i]
= f(i) sum= 0
For q ←1 to r do a←gj[ϕ(i)]
b ←Power (α[i], q)
sum = sum + a * b
End For
if j = 0 then V1[i] = V1[i] + sum
if j= 1 then V2[i] = V2[i] + sum
if j= 2 then V3[i] = V3[i] + sum
End For
End For
Vj ← Add V1, V2, V3
Step5. Store the token into Data storage
After token generation, the user has the choice of
either keeping the pre-computed tokens locally or storing
them in encrypted form on the cloud servers. Inourcase,the
user stores them locally to obviate the need for encryption
and lower the bandwidth overhead during dynamic data
operation. Figure3 describes token pre-computation before
dispersing the file to the cloud server.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 459
Fig-3: Token Pre-computation
5.3 Data Encryption and Decryption using RSA
Algorithm:
RSA is a block cipher, in which every message is mapped to
an integer. RSA consists of Public-Key and Private-Key. In
our Cloud environment, Pubic-Key is known to all, whereas
Private-Key is known only to the user who originally owns
the data. Thus, encryption is done by the Cloud service
provider and decryption is done by the Cloud user or
consumer. Once the data is encrypted with the Public-Key, it
can be decrypted with the corresponding Private-Key only.
RSA algorithm involves three steps:
1. Key Generation
2. Encryption
3. Decryption
1. Key Generation:
Before the data is encrypted, Key generationshould
be done. This process is done between the Cloud service
provider and the user.
The plain text is encrypted in blocks, with each
block having a binary value less than some number n i.e., for
block size i bits, 2i <n<2i+1 .
Input: None
Computations:
- Select two relatively prime numbers p and q.Where n=p*q
and v-(p-1)*(q-1).
- Compute the integer d such that (d*e)%v=1.
- e is the integer.
Output: n, e and d
2. Encryption
Input: Integers n, e, M
-M is integer representation of the plain text. Computation:
let C be the integer representation of the cipher text. C=(Me
mod n)
Output: Encrypted text or cipher text C.
3. Decryption
Input : d, n, C
- C is the cipher text.
Computation:
- let D be the decrypted text such that D=(Cd Mod n)
Output: D is the decrypted message.
Public Key: {e, n}
Private Key: {d, n}
6. CONCLUSION
As we all know Cloud computing is an of
government change apparatus that changing way to
undertaking hardware and software design and effecting
needs, requests. Because of cloud simpleness everyone is
moving facts and application software to cloud facts insides.
In this way, the amount of system of care for trade needed to
safe knowledge for computers is directly in relation to the
value of the facts. Security of the Cloud is dependent on law
computing and science of keeping knowledge safe and
secret. Only the made certain and given authority user can
way in the facts, even if some not with authority user gets
the knowledge for computers erroneously or purposely and
if takes the facts in addition, user can not decrypt the facts
and get back the first form knowledge for computersfrom it.
Facts safety is on condition that by implementing RSA
algorithm. In this way, in our offered work, we separate the
facts in cloud for safe place for storing using RSA algorithm.
The user knowledge for computers is encrypted using RSA
and separated into number times another gets in the way of
and stored on different cloud computers. The division of
knowledge for computers in the cloud general condition for
safe knowledge for computers place for storing gets done
safety as well as right not to be public to user facts and gives
greater value to the doing a play by copyingtechniques.Only
the given authority user can way in the facts. Even if some
undesired one going in (not with authority user) gets the
knowledge for computers erroneously or purposely if he
takes the facts in addition, he is not able to decrypt it and get
back the first form knowledge for computersfromit.Forthis
reason forward, out, on (in time), facts safety is on condition
that by implementing RSA algorithm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 460
REFERENCES
[1] Kalpana Batra, Ch. Sunitha, Sushil Kumar "An Effective
Data Storage Security Scheme for Cloud Computing"
International Journal of Innovative Research in Computer
and Communication Engineering Vol. 1, Issue 4, June 2013
[2] Parsi Kalpana, Sudha Singaraju "Data Security in Cloud
Computing using RSA Algorithm" International Journal of
Research in Computer and Communication Technology
IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.
[3] Ms. Soumya.N.S, Mrs. Prabha.R " Cloud Computing: Data
Security Using RSA " IJLTEMAS, ISSN 2278 - 2540, Volume
IV, Issue X, October 2015
[4] Bharti Dhote, A.M. Kanthe "Secure Approach for Data in
Cloud Computing" International Journal of Computer
Applications (0975 – 8887) Volume 64– No.22, February
2013
[5] S. Manjula, M. Indra, R. Swathiya "Division of data in
cloud environment for secure data storage" IEEE
ISBN: 978-1-4673-8438-4, 31 October 2016
[6] Subedari Mithila, P. Pradeep Kumar, ”Data Security
through Confidentiality in Cloud Environment”, Subedari
Mithila et al, / (IJCSIT) International Journal of Computer
Science and Information Technologies, Vol. 2 , 1836-1840,
2011.
[7] Zaigham Mahmood, “Data Location and Security Issues
in Cloud Computing”, Proceedings of International
Conference on Emerging Intelligent Data and Web
Technologies-2011.
[8] Institute of Electrical andElectronicsEngineers,Standard
Specifications for Public Key Cryptography -Amendment 1:
Additional Techniques, 2004.
[9] W. Diffie, M.E. Hellman, New directions in cryptography,
IEEE Trans. Inform. Theory 22(1976), 644–654.
[10] V. Gayoso Martínez, L. Hernández Encinas, and C.
Sánchez Ávila, Journal of ComputerScienceandEngineering,
Volum 2, Issue 2, August
BIOGRAPHIES
Prof. B. Rex Cyril is working as
Assistant Professor and pursuing
doctor of philosophy in Department of
Computer Science, St. Joseph’s
College,(Autonomous),Tiruchirappalli,
Tamil Nadu, India. He received his
M.Phil degree from Prist University. He
received his MSc degree from St.
Joseph’s College, Tiruchirappalli. His
area of interest is Cloud Security
Services.
Dr. S.Britto Ramesh Kumar is
working as Assistant Professor in the
Department of Computer Science, St.
Joseph’s College (Autonomous),
Tiruchirappalli, Tamil Nadu, India He
has published many researcharticlesin
the National/International conferences
and journals. His research interests
include Cloud Computing, Data Mining,
Web Web Mining, and Mobile
Networks.
2nd
Author
Photo
1’st
Author
Photo

More Related Content

What's hot

Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b  a  anjan a comparative analysis grid cluster and cloud computingIjarcce9 b  a  anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computingHarsh Parashar
 
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...IJCSIS Research Publications
 
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEDATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEijiert bestjournal
 
云计算及其应用
云计算及其应用云计算及其应用
云计算及其应用lantianlcdx
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET Journal
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersBaden Hughes
 
A survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmentA survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmenteSAT Publishing House
 
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...IJwest
 

What's hot (20)

Br36413417
Br36413417Br36413417
Br36413417
 
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b  a  anjan a comparative analysis grid cluster and cloud computingIjarcce9 b  a  anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
 
G033030035
G033030035G033030035
G033030035
 
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
Evaluating Cloud & Fog Computing based on Shifting & Scheduling Algorithms, L...
 
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEDATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
 
云计算及其应用
云计算及其应用云计算及其应用
云计算及其应用
 
A01260104
A01260104A01260104
A01260104
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
70 74
70 7470 74
70 74
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
 
A survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmentA survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environment
 
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...The Improvement and Performance of Mobile Environment using Both Cloud and Te...
The Improvement and Performance of Mobile Environment using Both Cloud and Te...
 

Similar to Data Division in Cloud for Secured Data Storage using RSA Algorithm

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET Journal
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...IRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 

Similar to Data Division in Cloud for Secured Data Storage using RSA Algorithm (20)

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Data Division in Cloud for Secured Data Storage using RSA Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 455 DATA DIVISION IN CLOUD FOR SECURED DATA STORAGE USING RSA ALGORITHM B. Rex Cyril1, DR.S. Britto Ramesh Kumar2 1Research Scholar and Assistant Professor, Department of Computer Science, St.Joseph’s College(Autonomous), 2Trichy, Tamilnadu, India2Asst.Professor, Department of Computer Science, St.joseph’s College(Autonomous) Trichy, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Cloud place for storing is an arm where facts is from far said (thing is true), managed, and backup. Cloud computing is group of resources and services offered through the net. Cloud services are handed over from facts middle's placed throughout the earth. Cloud computing helps its users by making ready machine-based resources via the net. However, working well knowledge for computers system of care for trade and strong encryption in the cloud is possible and ready (to be used) through a number of cloud answers. This paper aims at safe knowledge for computers place for storing in cloud. Here we separate the facts in cloud for safe place for storing using RSA algorithm. The user knowledge for computers is encrypted using RSA and separated into number times another gets in the way of and stored on different cloud computers. The division of knowledge for computers in the cloud general condition for safe knowledge for computers place for storing gets done safety as well as right not to be public to user facts and gives greater value to the doing a play by copying techniques. Keywords: Cloud Computing, Data Storage, Data security, Data Encryption, Data Decryption 1. INTRODUCTION Cloud computing is the most demanded technologies used all over the earth. It provides all kind of services for the users. One of the most readily seen arm offered by cloud computing is cloud place for storing. Cloud place for storing is simply a limited stretch of time that says something about to on line space that you can use to store your facts. In more solid way, cloud place for storing is an arm design to be copied in which facts is said, managed and backed up from far and made ready to users overa network. In it undertakings, the cloud are nearby trends,i.eitispower to moves computing and knowledge for computers away from tabletop and able to be taken about PCs into greatly sized facts insides. Sixty two parts of a hundred of undertakings go to person in authority that in the middle of it makes the majority of cloud using up decisions.43 parts of a hundred of it teams are offering a self-helping great door- way for way in to cloud arms, with an addition of 41 parts of a hundred idea or getting greater, stronger, morecompletea great door-way. The statements of cloud computing on condition that by National Institute of quality examples and Technologist says that: Cloud computing is a design to be copied for making able to right, on request network way in to a shared card-player's money of configurable computing resources (e.g. networks 3, servers, place for storing applications and arms) that can be rapidly provisioned and given out with least business managers hard work or arm giver effect on one another. With the help of greatly sized scale undertaking the net grows rapidly around the earth, applications can now be handed over as services over the net. As an outcome this overall price is made lower, less. From the view of facts safety, Cloud computingputs forward new questions safety being, saying violent behavior for many Reasons. firstly, old and wise cryptographic early persons for the knowledge for computers safety system of care for trade cannot be directly took up becauseuserhasno control over the facts under Cloudcomputing.Asanoutcome of that verification of right knowledge for computers place for storing in the cloud must be guided without clear and detailed knowledge of the complete work facts. Secondly, Cloud computing is not just a third group knowledge for computers store house.The knowledgeforcomputersstored in the cloud may be frequently changed knowledge by the users, including insertion, thing taken out, modification,join and so on. Last but not least, the placing of cloud computing is powered by knowledge for computers middle'srunning in at the same time, made distribution and worked together. Recently, the importance of making certain the far away, widely different facts true, good nature hasbeenhigh- lighted by the different make observations works. These expert ways of art and so on, which can be useful to make certain the place for storing rightness cannot house all the safety being, saying violent behavior in cloud knowledge for computers place for storing, since they all are focusing on single computer scenario. In this paper we offer a working
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 456 well way to safe knowledge for computers place for storing in cloud. Here we separate the facts in cloud for safe place for storing using RSA algorithm. 2. RELATED WORK The survey [2] guided by Salt march news in the third quarter of this year measured power being conscious of Business technology experts including their important questions in taking up Cloud, the drivers, how their organization's map to use Cloud, the different stages of Adoption, and the cloud flat structures, applications,persons for whom one does work, roads and systems and place for storing used. "While facts secretly and audit ability (24.5%) topped the list of first obstacles for the use of cloud. Computing technologies, doing a play state of not being able to say before-hand (20.1%) appeared to be another key cause dampening Adoption levels". knowledge for computers get moved from one position to another narrow part (of road) (17.5%) and facts lock-in (14.3%) were next on the list of factors as stated by Respondents. Cloud computing[4] provides the place for storing and supports for getting work done by others of knowledge for computers without having the nearby copy of facts or records. However an importanthardquestionisto puta stop to not with authority adjustments. But, for this it has need of either facts copyingoron-demandcomputationofa purpose, use (e.g. a number without thought of amount) over the complete outsourced facts. In text record distribution [1], the text record is separated into the gets in the way of and goes away the text record F unnecessarily across a group of made distribution computers. Facts are stored in the encrypted form on the computers. All the forceful operations like thing put in, update, join and take out can be done on the facts gets in the way of. As in agreement the changes in text record, factsgets in the way of are separated and stored on the facts computers again. While getting back the facts, the facts gets in the way of separate records are merged and profit to the user. To check the rightness of the text record, question small things have been sending to the cloud place forstoring system. To make ready safety for cloud facts RSA Algorithm [3] is used, RSA is the deterministic encryption algorithm. It was undergone growth by Ron go back, aldi shamir, and Len adleman at Mit and first made public in 1978[rivert-shamir- adleman (RSA)]. In this design the level stretch of country teaching book and cipher teaching book are complete numbers, not parts between 0 and n-1 for some N. A of a certain sort size for N is 1024 bits. RSA algorithm[5]; In this careful way some important safety services including key living-stage, encryption and decryption are on condition that in Cloud computing system. The main end, purpose is to safely store and manage facts that are not controlled by the owner of the facts. The facts are stored in cloud general condition Cloud safety here is not answer to by making ready a RSA algorithm. 3. PROBLEM STATEMENT 3.1 System Architecture: In cloud knowledge for computers place forstoring, a user stores his knowledge for computers through a cloud Service giver into a pot of cloud computers, which are running in an at the same time, worked together and made distribution way Fig (1). Net structure connection provides facilities to upload download and act the forceful operations on facts text record. Checking to make certain System lets the given authority user to get the way in to the cloud place for storing. User checking tomakecertainway isdonebefore to the place for storing and acts to get back. It provides the facts right not to be public to the user. It also lets user to change his outline. Place for keeping records one making discovery in new country provides the selections to look for a text record and act forceful operations. Withthesolidmass operation, it provides different operations like bring to the current state join and take out on one computer. We can view the is in of the text record stored on the one computer. With the upload thing for which selection is made, user can upload the knowledge for computers text record from his system on the cloud computers.Withthedownload(right of) selection between, it will list down all the users text record, and selected text record can be downloaded on users place. Here encryption and decryption isdoneusingRSAalgorithm RSA is a block cipher, in which every message is mapped to an integer. RSA consists of Public-Key and Private-Key. In our Cloud environment, Pubic-Key is known to all, whereas Private-Key is known only to the user who originally owns the data. Thus, encryption is done by the Cloud service provider and decryption is done by the Cloud user or consumer. Once the data is encrypted with the Public-Key, it can be decrypted with the corresponding Private-Key only.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 457 Authorized userClient Machine Web Interface Authentication system Change profile File explorer Block operation Upload file download File distribution RSA encryption Token generation Cloud storage Cloud storage Cloud storage RSA decryption Merge Fig-1: System Architecture for cloud storage 3.2 Design Goals: Offered design is to make good at producing an effect facts safety design to be copied which supports for i)Data true, good nature to make certain the users facts is right and stored in cloud computer. ii) Have an effect ongive position of the computer on which facts has been made an adjustment by not with authority user. iii) Support for the forceful facts like join, take out, insert, bring to the current state while making payment before work the same place for storing rightness. 4. DATA SECURITY Cloud possesses the security problem in Data segregation, Data theft, unauthorized access, Uncleared Owner and responsibility of Data Protection, Data Loss conditions Data security framework Security[3] is the majorconcerntoaccessthedata in cloud. Security involves protecting data from being lost, destroyed or modified. 1) Protection of Data: Data can be protected from the outside user by creating the security keys such as private key. 2) Building Blocks: Mathematical and cryptographic principles server as the building blocks of the security. 3) Integrity of data: while uploading the data the user can verify the correctness of the integrity principles. 4) Accessing the Data: Due to the Encryption and Decryption techniques data can be accessed securely. 5) Authentication: Authentication allows only authorized user to access Data in cloud. 5. PROPOSED WORK In our offered work, we are making separate the facts in cloud for safe place for storing using RSA algorithm. RSA algorithm [2] to encrypt the facts to make ready safety so that only the had a part in user can way in it. By getting the facts, we are not letting not with authority way in to it. User facts are encrypted first and then it is stored in the Cloud. When needed, user places a request for the facts for the Cloud giver; Cloud giver makescertaintheuserandgives the facts. 5.1 Data Division F – The data file to be stored. We assume that F can be denoted as a matrix of m equal-sized data vectors, each consisting of l blocks. Data blocks are all well represented as elements in Galois Field GF (2p) for p = 8 or 16. File is split into fixed-size blocks which are stored on servers and all blocks are replicated and dispersedoverdistributedservers. We rely on this technique to disperse the data file F redundantly across a set of n = m+ k distributed servers.File data should be greater than or equal to the number of server on which it is going to store. Algorithm 1: File Distribution Preparation Step1. Check the file’s data length greater than or equal to the number of server. If it is blank file or the data length is less, then prompt the message to the user. Step 2. Generate the file matrix. The Generate_Matrix (file) function divides the file into equal data vector length. Data vectors are created dependingonthedistributionof the file. datavector_length= If file_length mod n < > 0 then datavector_length = datavector_length+1 This divides the file into n number of blocks. Vector1 contains the data bytes from 1 to datavector_length fromthe file. Vector 2 contains the data bytes from the location of datavector_length to (2 * datavector_length) and so on. Each vector represents the data block of matrix of Galois Field. Use the Vander monde matrix for the Matrix_Multiply () function. Construct A using Vander monde matrix defined over GF (2w). For e.g. if we take 3x3 Vander monde matrix defined over GF (24)
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 458 Step 3. Perform Matrix_multiply(vector, A) operationoneach data vector. Use g1, g2, g3…gm as data vector names. sum = 0; count = 0; For k 1 to File_length Do For i 1 to datavector_length Do sum = sum +vector[i] *A[count]; For all data vectors Do End for count = count + 1; End For End For Step 4. Encryption is applied on each data vector and data vectors are disperse on the distributed servers. The data vector of a file is replicated on the cloud servers. Fig-2: Distribution of File Stored on Cloud 5.2 Token Generation: Before storing the knowledge forcomputersgivesdirections to be taken on cloud computers, user pre-computes the verification tokens [4]. These small things are used to check the true, good nature of knowledge for computers stored on cloud computers. Also these small things are used to give position of the cloud computeronwhichfactshasbeenmade an adjustment by the computer expert for pleasure. Before facts division and going away text record user produces small things on person facts gives directions to be taken. When user wants to check the rightnessofthefacts,hesends the text record thing taken to be the same to the cloud computers. User may send physical acts offer on one facts solid mass in addition. Upon letting into one's house question small thing, each cloud computer works out the things like money on the facts guide, and sends themtouser. If the small things of users and worked out small thingsfrom cloud computers are matched, then the facts is right. If the small things are not matched, then an adjustment has been done in the facts by not with authority user. This shows cloud cut, make a division of is behaving badly. Step1. Choose the parameter r for number of indices per verification and pseudorandom function f, pseudorandom Permutation function ϕ Step2. Choose the parameters t, the number of tokens to be generated and l the length of the data vector. Step3. Chose α as a vector to compute the tokens and V to store the tokens. Step4. Read the file as byte array. Divide this byte array into parts. Each part contains byte and represents it into polynomial. (for example dividing byte array in 3parts). For j←1 to n Do For i ← 1 to t Do α[i] = f(i) sum= 0 For q ←1 to r do a←gj[ϕ(i)] b ←Power (α[i], q) sum = sum + a * b End For if j = 0 then V1[i] = V1[i] + sum if j= 1 then V2[i] = V2[i] + sum if j= 2 then V3[i] = V3[i] + sum End For End For Vj ← Add V1, V2, V3 Step5. Store the token into Data storage After token generation, the user has the choice of either keeping the pre-computed tokens locally or storing them in encrypted form on the cloud servers. Inourcase,the user stores them locally to obviate the need for encryption and lower the bandwidth overhead during dynamic data operation. Figure3 describes token pre-computation before dispersing the file to the cloud server.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 459 Fig-3: Token Pre-computation 5.3 Data Encryption and Decryption using RSA Algorithm: RSA is a block cipher, in which every message is mapped to an integer. RSA consists of Public-Key and Private-Key. In our Cloud environment, Pubic-Key is known to all, whereas Private-Key is known only to the user who originally owns the data. Thus, encryption is done by the Cloud service provider and decryption is done by the Cloud user or consumer. Once the data is encrypted with the Public-Key, it can be decrypted with the corresponding Private-Key only. RSA algorithm involves three steps: 1. Key Generation 2. Encryption 3. Decryption 1. Key Generation: Before the data is encrypted, Key generationshould be done. This process is done between the Cloud service provider and the user. The plain text is encrypted in blocks, with each block having a binary value less than some number n i.e., for block size i bits, 2i <n<2i+1 . Input: None Computations: - Select two relatively prime numbers p and q.Where n=p*q and v-(p-1)*(q-1). - Compute the integer d such that (d*e)%v=1. - e is the integer. Output: n, e and d 2. Encryption Input: Integers n, e, M -M is integer representation of the plain text. Computation: let C be the integer representation of the cipher text. C=(Me mod n) Output: Encrypted text or cipher text C. 3. Decryption Input : d, n, C - C is the cipher text. Computation: - let D be the decrypted text such that D=(Cd Mod n) Output: D is the decrypted message. Public Key: {e, n} Private Key: {d, n} 6. CONCLUSION As we all know Cloud computing is an of government change apparatus that changing way to undertaking hardware and software design and effecting needs, requests. Because of cloud simpleness everyone is moving facts and application software to cloud facts insides. In this way, the amount of system of care for trade needed to safe knowledge for computers is directly in relation to the value of the facts. Security of the Cloud is dependent on law computing and science of keeping knowledge safe and secret. Only the made certain and given authority user can way in the facts, even if some not with authority user gets the knowledge for computers erroneously or purposely and if takes the facts in addition, user can not decrypt the facts and get back the first form knowledge for computersfrom it. Facts safety is on condition that by implementing RSA algorithm. In this way, in our offered work, we separate the facts in cloud for safe place for storing using RSA algorithm. The user knowledge for computers is encrypted using RSA and separated into number times another gets in the way of and stored on different cloud computers. The division of knowledge for computers in the cloud general condition for safe knowledge for computers place for storing gets done safety as well as right not to be public to user facts and gives greater value to the doing a play by copyingtechniques.Only the given authority user can way in the facts. Even if some undesired one going in (not with authority user) gets the knowledge for computers erroneously or purposely if he takes the facts in addition, he is not able to decrypt it and get back the first form knowledge for computersfromit.Forthis reason forward, out, on (in time), facts safety is on condition that by implementing RSA algorithm.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 460 REFERENCES [1] Kalpana Batra, Ch. Sunitha, Sushil Kumar "An Effective Data Storage Security Scheme for Cloud Computing" International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4, June 2013 [2] Parsi Kalpana, Sudha Singaraju "Data Security in Cloud Computing using RSA Algorithm" International Journal of Research in Computer and Communication Technology IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012. [3] Ms. Soumya.N.S, Mrs. Prabha.R " Cloud Computing: Data Security Using RSA " IJLTEMAS, ISSN 2278 - 2540, Volume IV, Issue X, October 2015 [4] Bharti Dhote, A.M. Kanthe "Secure Approach for Data in Cloud Computing" International Journal of Computer Applications (0975 – 8887) Volume 64– No.22, February 2013 [5] S. Manjula, M. Indra, R. Swathiya "Division of data in cloud environment for secure data storage" IEEE ISBN: 978-1-4673-8438-4, 31 October 2016 [6] Subedari Mithila, P. Pradeep Kumar, ”Data Security through Confidentiality in Cloud Environment”, Subedari Mithila et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 , 1836-1840, 2011. [7] Zaigham Mahmood, “Data Location and Security Issues in Cloud Computing”, Proceedings of International Conference on Emerging Intelligent Data and Web Technologies-2011. [8] Institute of Electrical andElectronicsEngineers,Standard Specifications for Public Key Cryptography -Amendment 1: Additional Techniques, 2004. [9] W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory 22(1976), 644–654. [10] V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila, Journal of ComputerScienceandEngineering, Volum 2, Issue 2, August BIOGRAPHIES Prof. B. Rex Cyril is working as Assistant Professor and pursuing doctor of philosophy in Department of Computer Science, St. Joseph’s College,(Autonomous),Tiruchirappalli, Tamil Nadu, India. He received his M.Phil degree from Prist University. He received his MSc degree from St. Joseph’s College, Tiruchirappalli. His area of interest is Cloud Security Services. Dr. S.Britto Ramesh Kumar is working as Assistant Professor in the Department of Computer Science, St. Joseph’s College (Autonomous), Tiruchirappalli, Tamil Nadu, India He has published many researcharticlesin the National/International conferences and journals. His research interests include Cloud Computing, Data Mining, Web Web Mining, and Mobile Networks. 2nd Author Photo 1’st Author Photo