Loading

Privacy and Security Aware Cloud Storage using Double Cryptography Method
B. Muthu Lakshmi1, M.Venkatesulu2

1B. Muthu Lakshmi, Department of Computer Applications, Kalasalingam University, Krishnankoil (Tamil Nadu), India.
2M. Venkatesulu, Department of Information Technology, Kalasalingam University, Krishnankoil (Tamil Nadu), India.
Manuscript received on 01 December 2019 | Revised Manuscript received on 19 December 2019 | Manuscript Published on 31 December 2019 | PP: 577-582 | Volume-8 Issue-4S2 December 2019 | Retrieval Number: D11081284S219/2019©BEIESP | DOI: 10.35940/ijrte.D1108.1284S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing, a remote technology that enlightens with several on-demand services. Cloud computing developed with a principle of sharing resources available as per the company needs. Prominent cloud services utilized today are networking, storage, servers, software’s, etc. Cloud computing’s distributed nature and advanced features create a remarkable footprint in the IT field. It is fair to say without cloud technology the next technical era can’t exist. However the cloud computing widely spaced, simultaneous some serious challenges still exists. As per the real-time scenario, there are several challenges still alive, but among which privacy and security are prominent to take concern. Among which the trustworthiness of third-party providers increases the attention on developing an enhanced cloud system. In this paper, we proposed an improved double encryption-decryption (IDED) method for a secure cloud system. The main intention of the proposed work is increasing the privacy and security for the cloud users. The principle applied to the proposed methodology is double encryption and double decryption. The encrypted files are decrypted to view the original data using the keys. These keys are available only to the authenticated users which ensures the system’s privacy and security in all manner. The mechanism is processed under the query system of sending and response from the data authority.
Keywords: Cloud Computing, Resource Sharing, Encryption, Decryption, Data Storage, Cloud Service Provider, Data Authority and End User.
Scope of the Article: Cloud Computing