Secure and Smart Monitoring of Sensitive Data in Cloud Computing using Effective Cryptographic Scheme
A.S. Kalyana Kumar1, T.Abdul Razak2

1A.S. Kalyana Kumar*, Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore Tamil Nadu, India.
2DR. T. Abdul Razak, Professor, Department of computer science and engineering, Jamal Mohamed College, Tiruchirapalli, Tamil Nadu, India.
Manuscript received on September 23, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP: 7079-7086 | Volume-9 Issue-1, October 2019 | Retrieval Number: A2094109119/2019©BEIESP | DOI: 10.35940/ijeat.A2094.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The advantage of storing infinite data without giving any attention to the available storage restrictions and the liberty that one possesses to use those data when needed from anywhere in the globe, makes cloud environment the most ideal technology. Cloud hadal so became the preferred platform for storing and transferring the intended data. Both individuals and organizations were much comfortable in letting their sensitive data across their own generated cloud environments. But apart from the advantages that the cloud environments have imparted, it also have its own limitations. Limitations like risk of maintaining user’s data privacy, integrity, confidentiality and safety were normally existing while using the cloud environments. Besides all of the above said challenges, transferring of data from organization to cloud servers was considered with major importance in many evolving works. Several algorithms and encryption techniques have been developed currently for securing the operation of data transmission. Along this way, this paper proposes a design for the cloud framework that guarantees secured data transmission to server from the source. This paper utilizes an approach called Honey Bee algorithm for encrypting and decrypting the data to be transmitted to the server. This algorithm is basically an encryption scheme which provides flexibility against the potential attacks by delivering a reasonable-looking text. But, the reasonable-looking text is a kind of plain text generated for every wrong key used by an attacker for decrypting the message. Here a count of five keys will be generated by the PRNG algorithm right after matching the OTP keys, which will be then randomly sent to users. The generated five keys are deployed to promote additional security by the operation of anonymization against the intruder strying to access the data while under transmission. Here, in this proposed methodology, user cannot view all of his/her information, whereas the admin can have the full privilege of viewing all information about a user. Furthermore, performance metrics such as Key generation time, Encryption time, Decryption time and Message time were taken for the performance analysis to validate the performance of this proposed methodology with the existing considered methodologies.
Keywords: AZ-SEP, WSN, IoT, LEACH, Throughput, Energy efficient, heterogeneous protocol.