Author:
Elangovan Dinesh,Muthiya Ramesh
Abstract
Cloud computing is the method of employing a set-up of isolated servers to be hosted on the web to accumulate and supervise information instead of an area server or a private laptop. Storage of data in cloud sometimes creates security issues in the data stored so, security in provided for the stored cloud data. In order to provide secured cloud data transaction, our proposed method initially verifies the authentication of the user followed by splitting the information of the user using pattern-matching technique. The blowfish computation is used to encrypt the alienated data. After encryption, resorting to the selection of the optimal position of a data center by means of the cross grey wolf optimization and firefly technique is done. Finally, the encrypted data are stored at an optimal location in the cloud. Then the data split column wise and separated at an optimal location in the cloud, this method is highly secured since the user cannot retrieve the file without authentication verification
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Smart Homes Using Hybrid Stacking Ensemble Deep Learning-Enabled Framework;2023 2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI);2023-12-27
2. Optimized Ensemble Model Towards Secured Industrial IoT Devices;2023 24th International Arab Conference on Information Technology (ACIT);2023-12-06
3. Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing;Computers, Materials & Continua;2022