Loading

Secure Data Storage in Cloud Service using RC5 Algorithm
Sachindra K. Chavan1, Manoj L. Bangare2

1Sachindra K. Chavan, P.G. Scholar, Department of IT., SKNCOE, Pune (Maharashtra), India.
2Manoj L. Bangare, Professor, Department of IT., SKNCOE, Pune (Maharashtra), India. 

Manuscript received on 20 November 2013 | Revised Manuscript received on 25 November 2013 | Manuscript published on 30 November 2013 | PP: 112-117 | Volume-2 Issue-5, November 2013 | Retrieval Number: E0886112513/2014©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Enterprises always used organizational internal storage system for storing data. Mainly in a Customer Relational Management i.e. CRM system, the internal storage will be used for storing all the data of the customer. On the other hand, the main drawbacks in the data storage is there may be intruder’s in the administrator side and they may acquire all the information about a customer. Above threats can happen in same service provider in a cloud computing environment. To overcome with this kind of challenges in cloud computing, there is need of an innovative algorithmic approach for data security in cloud computing. A CRM (Customer Relational Management) system services is represented in this paper using RC5 algorithm. In the proposed system the party that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is responsible for encryption/decryption of the user’s data and then must delete data once encryption/decryption process is completed. In this paper the use of CRM services which demonstrates how the parties involved in secure storage and retrieval when data is saved to the cloud.
Keywords: Cloud Computing, CRM Service, Data Retrieval and Storage, Encryption/Decryption, RC5 algorithm, Secure Storage.

Scope of the Article: Data Mining