Emphasize the Cloud Security Using Various Substitution Techniques
P Rajashekar1, D. Aruna Kumari2, P K V S Sarma3, Y Prabhu Kumar4
1P Rajashekar, Assistant Professor, Department of CSE, Vidya Jyothi Institute of Technology, Hyderabad (Telangana), India.
2Dr. D. Aruna Kumari, Professor, Department of CSE, Vidya Jyothi Institute of Technology, Hyderabad (Telangana), India.
3P K V Sarma, Assistant Professor, Department of CSE, Vidya Jyothi Institute of Technology, Hyderabad (Telangana), India.
4Y Prabhu Kumar, Department of CSE, VJIT, Hyderabad (Telangana), India.
Manuscript received on 20 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 02 November 2019 | PP: 3725-3729 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B14750982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1475.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing is the technology used for storing the Information and packages on faraway servers and accessing them through the net rather than saving or installing them to your non-public or office pc. The time period cloud is used because information and programs are saved on a cloud or collection of web servers and computers owned by a third party. Most issues start from the fact that the person loses manipulate of his or her records, because it’s miles stored on a laptop belonging to a person else (the cloud provider). Cloud Computing affords a platform with an superior and efficient way to store statistics inside the cloud. The functioning of Cloud Computing is significantly distressed with the aid of problems including that of statistics safety, integrity, theft, loss and presence of inflamed applications. These troubles are the important dangers to the consumer to transport their statistics to the cloud. we have analyzed various Substitution techniques to attain high level of security to cloud storage.
Keywords: Cloud, Plain Text, Cipher text, Encryption, Decryption, Cryptography, Security, Key.
Scope of the Article: Cloud Computing