Open Access Open Access  Restricted Access Subscription or Fee Access

An Enhanced Security Algorithm for Data Transmission in Cloud Computing

P. Suganthi, E. Mahalakshmi

Abstract


Cloud computing is a large scale distributed computing paradigm in which a pool of computing resources is available to users via the Internet. Hence Security plays  an important role in cloud computing. The universal technique for providing confidentiality of transmitted data is cryptography. This paper provides a technique to encrypt the data using watermark and send the encrypted data through cloud to the requested user. For authentication the sender and receiver exchanges key between them. The key is approved by the owner then only the data accessed by the user. The Rubik’s Cube Encryption is used for the watermark encryption. The result shows better security than existing algorithms. This algorithm provides efficient transmission in heterogeneous computing environments.

2 � rc��o Encryption process takes in Client side using an RC6 (Block Cipher Algorithm) and SHA3(Secure Hash Algorithm) before data store in the cloud server or cloud storage. The server side decryption is taken in Authentication methodology. The access data in cloud categorized in (Public, Hybrid and Private Cloud) Public cloud access in open access documents to view not download, the Hybrid User can access the document with authentication code from the cloud server system, Private User can Access all type of secured data get Authenticate from the client system or client Email code verification in the Cloud Data. Authentication process to prevent the intruder, malicious attacker, Inside Attacker, Outside Attacker

 


Keywords


Cloud Computing, Data Transmission, Security, Encryption Algorithms.

Full Text:

PDF

References


C. K. Huang, H. H. Nien, S. K. Changchien, and H. W. Shieh, “Image encryption with chaotic random codes by grey relational grade and Taguchi method,” Optics Communications, vol. 280, no. 2, pp. 300–310, 2007.

S. Mazloom and A. M. Eftekhari-Moghadam, “Color image encryption based on CoupledNonlinear ChaoticMap,” Chaos, Solitons and Fractals, vol. 42, no. 3, pp. 1745–1754, 2009.

Y. Tang, Z. Wang, and J. A. Fang, “Image encryption using chaotic coupled map lattices with time-varying delays,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2456–2468, 2010.

C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. [5] O. Edward, Chaos in Dynamical Systems, Cambridge University Press, Cambridge, UK, 2nd edition, 2003.

Neha Mehrotra,”Cloud-Testing vs. Testing a cloud”,10th Annual International Software Testing Conference 2010.

Wayne Jansen, Timothy Grance ,” Guidelines on Security and Privacy in Public Cloud Computing” , National Institute of Standards and Technology, Special publication 800 – 144

“Security of Cloud Computing Providers Study “Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011.

Ramana Reddy, Munaga V.N.Prasad, D.Sreenivasa Rao: Robust Digital Watermarking of Color Images under Noise Attacks. In: International Journal of Recent Trends in Engineering, Vol.1, No. 1, May 2009.

J. F. Hauer et al., “Use of the WECC WAMS in wide-area probing tests for validation of system performance and modeling,” IEEE Trans.Power Syst., vol. 24, pp. 250–257, Feb. 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.