Loading

Data Obfuscation Technique for Security in Cloud Computing
Diwakar Ramanuj Tripathi
Dr. Diwakar Ramanuj Tripathi, Information Technology Consultant, Nagpur.

Manuscript received on January 05, 2020. | Revised Manuscript received on January 25, 2020. | Manuscript published on January 30, 2020. | PP: 4239-4244 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6720018520/2020©BEIESP | DOI: 10.35940/ijrte.E6720.018520

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is at present a day’s changes into the most crushed in marvels to use for enormous scale alliance or for person who need unmistakable structure organizations with least expense. Usually person’s data is dealt with on open Cloud which is accessible to everybody for get to. These focal raises some issue in reverse to adaptable organizations gave by cloud suppliers, similar to Confidentiality, Integrity, Availability, Authorization and some more. Starting late, Lots of decisions are open to guarantee the data and most perfect ways is to use encryption. Encryption can’t give enough confirmation while contemplating heaps of customers’ fragile data. It in like manner eats up greater chance to perform encryption and translating process for every single inquiry. Moreover it is definitely not an OK practice to contemplate customer driven considering the way that once customer data is moved on Cloud premises, customer doesn’t have direct control over this data. To empty load of Cloud server likewise to give acceptable security to customer’s data, we propose a methodology by joining the two procedures viz. Jumbling and Encryption in this assessment paper. Customer data may be scrambled if protection is needed for its records or reports and the SaaS Cloud organization is reviewed using obscurity techniques. Using this two-way approach, we may assume that the proposed agreement provides sufficient protections for darkened access and safety of even open data on cloud servers. Our point is additionally to give appropriate assessment on data disordering for security in cloud computing.
Keywords: Cloud Computing, Confidentiality, Privacy, Data Security.
Scope of the Article: Cloud Computing.