JJEM: Special Edition 2 (December 2024)
JJEM: Special Edition 2 (December 2024)
2024-12-08
Two level secured file storage cloud computing
Pallavi G R, Sampath Kumar
As for every business sector starting from military and ending with the higher education needs many kinds of services. As cloud provides almost unlimited storage. Even though many of these clients do not have direct physical interaction with the server computer, it is possible to request to view or to access data in this cloud. How eve'; the most important concern that has been associated with online data storage commonly referred to as cloud storage security. There are number of ways for solving this security issue. The two common solutions that are widely used now are as follows: steganography and cryptography. Nevertheless, there are cases where some single method or Algorithm cannot give very good security Hence, in this paper, we are presenting a newform of security method the is composed of several cryptographic algorithms, namely steganography and symmetric key. The methods used in this recommended system of avoiding data leakage are 3DES (Triple Data Encryption Standard), RC6 (Rivest Cipher 6), and AES (Advanced Encryption Standard). Both the algorithms use 128-bit keys. Thus, the key data is concealed using the ISB steganography method. The key details will he the traits often encrypted pan, the algorithm, and the key to the algorithm. Encryption is performed on the file in three parts. By utilizing multithreading, these various segments of the Jile will then be processed and encrypted through different algorithms at the same time. To embed the important information, LSB method is applied in an image. Enhanced security compliance as well as customer data protection is provided by our approach based on AES for storing encrypted data at one cloud server AES, DES and RC6 algorithm.
Cloud Computing and Storage, AES Algorithm, RSA Algorithm, Blowfish Algorithm