GLEnc Obfus-Encryption and Obfuscation Technique to Enhance Data Protection in Public Cloud Storage
D. I. George Amalarethinam1, Lalu P. George2, Anjana S. Chandran3
1Dr. D. I. George Amalarethinam, Bursar & Director (MCA), Associate Professor of Computer Science, Jamal Mohamed College (Autonomous), Tiruchirappalli, Affiliated to Bharathidasan University, Tamil Nadu, India.
2Lalu P. George, Research Scholar, Department of Computer Science Jamal Mohamed College (Autonomous), Affiliated to Bharathidasan University, Tiruchirapalli, India.
3Dr.Anjana S. Chandran, Assistant Professor, SCMS School of Technology and Management, Cochin, India.
Manuscript received on November 20, 2019. | Revised Manuscript received on November 28, 2019. | Manuscript published on 30 November, 2019. | PP: 7238-7242 | Volume-8 Issue-4, November 2019. | Retrieval Number: D5276118419/2019©BEIESP | DOI: 10.35940/ijrte.D5276.118419
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: There is a rapid increase in data volume all over the world. In the computer network world also, imminent changes are happening. Under any circumstance, data can be vulnerable from one’s own side or by a service provider or on data movement. In that case we need to secure our data. In this paper, the improved methods of protection against data leakage has been discussed. Public cloud data theft can happen through intruders or hackers or service providers. The data securing algorithm are used prior to storing the data in the server. Any data entering the cloud area is segregated into numerical and non-numerical parts, where non-numeric is operated by one algorithm and obfuscation method is applied on the numeric part. These two operations are done simultaneously with different threads. This both works come together and developed an entirely different algorithm. Hence the proposed algorithm maximizes the security and reduces the service cost. The proposed method is implemented as a cloud application and hosted on a cloud platform as a service and tested by subsisting present methods with respect to time and security levels. From the results, it is observed that the proposed method GLEncObfus is more efficient than present methods with reference to encryption-obfuscation time, decryption-de-obfuscation time and security level.
Keywords: Cloud Computing, Cloud Security, Secure Outsourcing, Public Cloud.
Scope of the Article: Cloud Computing.