Dual Shuffling Algorithm Incorporated with Blowfish (DS-BF) to Elevate Data Security in Cloud Storage.

  • S. Ramalakshmi, Dr. V. Vallinayagi

Abstract

Cloud computing has been escalating broadly; users and service suppliers can use resources economically and easily without retaining all the needed resources. In the present scenario it’s better to adapt public cloud storage instead of setting up a server and maintaining it. Cloud computing also has some security issues that are application security, access control and authentication. Protection of data in the public cloud is a challenging one because till now user believes service provider’s security policies but it is not promisable. There are so many possibilities for data lack, data theft, data loss, unauthenticated access and so on. In this research the work focuses on client side data security. Client regulates their security policies before uploading data into the cloud or any other online storage services. This work focuses on providing authentication and security for data. Authentication achieves from three perspectives that are Knowledge factors, Inherence Factors and Possession factors. Smart Card, Biometric Identification and OTP generation are the three main methods used to provide authentication. Data shuffling and Encryption are the methods used to provide security for the data. After satisfying all these encryption and authentication mechanisms now the data is ready to upload in the public cloud storage. This mechanism is applicable for an individual user and organization. Biometric, Data Shuffling and Cryptography techniques joined together to achieve a higher authentication and security for client data. At the end, this mechanism allows only authenticate user can access and decrypt data.

Published
2020-02-20
How to Cite
Dr. V. Vallinayagi, S. R. (2020). Dual Shuffling Algorithm Incorporated with Blowfish (DS-BF) to Elevate Data Security in Cloud Storage. International Journal of Advanced Science and Technology, 29(3), 3382 - 3390. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/4783
Section
Articles