Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System

Design and Implementation of Crypt Analysis

of Cloud Data Intrusion Management System

Dinesh Elangovan and Ramesh Muthiya

Department of Electronics and Communication Engineering, Anna University, India

Abstract: Cloud computing is the method of employing a set-up of isolated servers to be hosted on the web to accumulate and supervise information instead of an area server or a private laptop. Storage of data in cloud sometimes creates security issues in the data stored so, security in provided for the stored cloud data. In order to provide secured cloud data transaction, our proposed method initially verifies the authentication of the user followed by splitting the information of the user using pattern-matching technique. The blowfish computation is used to encrypt the alienated data. After encryption, resorting to the selection of the optimal position of a data center by means of the cross grey wolf optimization and firefly technique is done. Finally, the encrypted data are stored at an optimal location in the cloud. Then the data split column wise and separated at an optimal location in the cloud, this method is highly secured since the user cannot retrieve the file without authentication verification.

Keywords: Cloud computing, Pattern Matching Technique, Blowfish Algorithm, Hybrid Grey Wolf Optimization and Firefly Technique.

Received July 11, 2019; accepted May 10, 2020

https://doi.org/10.34028/iajit/17/6/8
Read 579 times Last modified on Sunday, 01 November 2020 03:28
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…