A Combination of EOBE to Enhance Data Security in Cloud using SKM Algorithm
Shaik khaja mohiddin1, Y Suresh Babu2
1Shaik khaja mohiddin, Research Scholar, Dept. of CSE, Acharya Nagarjuna University., Asso. Prof., Dept. Of CSE. VVIT, Guntur, Andhra Pradesh, India.
2Dr. Y Suresh Babu, Dept. Of CSE,JKC College, Guntur, Andhra Pradesh, India.
Manuscript received on September 23, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP: 5474-5484 | Volume-9 Issue-1, October 2019 | Retrieval Number: A3089109119/2019©BEIESP | DOI: 10.35940/ijeat.A3089.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Protection of client’s data in cloud is an important aspect which a cloud service provider assures to a cloud user. Though using high end sophisticated methods security is provided to client’s data in cloud. Besides this theft of data has emerged as one of the common and major issue and which has grown to a big challenge even today also. In this paper we have proposed a unique algorithm which provides security for the data in different forms stored in cloud. In this paper we used a unique algorithm “SKM” by combining EOBE methods where encryption, obfuscation followed by binary encryption is effectively used to reach out the required target task. The data may be either, numeric, non-numeric or binary data related to image files. Depending on kind of data the required process is initiated in order to convert the data in a safe form. From the suggested algorithm a reduced timing with respect to encryption, decryption was achieved. Though the security concept in cloud is a bit difficult to deal, our proposed algorithm has achieved maximum security level among the existing ones. Using industrial tool the observed results are compared with the existing and popular methods of security algorithms. This creates a confidence among several cloud users and small scale business organization to move and enhance their belief on security of data in cloud.
Keywords: KG Maa S, S Taa S, S Eaa S, Obfuscation, Cloud Forensics.