Open Access Open Access  Restricted Access Subscription Access

Fibonacci Technique for Privacy and Security to Sensitive Data on Cloud Environment


Affiliations
1 Computer Science and Engineering ,Chalapathi Institute of Engineering and Technology, Guntur, India
2 Computer Science and Engineering ,YSR Engineering College of Yogi Vemana University, Proddatur, India
 

Cloud computing is increasingly popular in the distribution of the computing environment. Process and implement cloud storage data to become a global movement. Software as an organization Software as a Service (SaaS) has many commercial applications and in our day to day, we can only saythat it is disruptive technology [1]. Data security has become a major problem in the field of cloud ecosystems because data is available in various parts of the world to access the Internet for free as it progresses. The global security record for mid-2018, with a cloud data migration of approximately 86.67%, a global analyst estimates that this range can be 100% [8, 9]. Change the data of two or more people, so that unauthorized people can access real data. There are many different ways to perform this conversion, but the method there has proposed a text input method so that the recipient can access the original information. Encryption has become a solution and alternative encryption algorithms play an important role in the security of data in the cloud. In this process, the process investigation operation is designed to obtain data to avoid breaking an unauthorized person. In this way, you can protect any type of files using the Fibonacci series. The proposed algorithm s is encryption and decryption process takes a less of time compare with other traditional security algorithms.

Keywords

Fibonacci, Security, Cloud, Confidentially, Symmetric Key.
User
Notifications
Font Size

Abstract Views: 153

PDF Views: 0




  • Fibonacci Technique for Privacy and Security to Sensitive Data on Cloud Environment

Abstract Views: 153  |  PDF Views: 0

Authors

Harikrishna Bommala
Computer Science and Engineering ,Chalapathi Institute of Engineering and Technology, Guntur, India
S. Kiran
Computer Science and Engineering ,YSR Engineering College of Yogi Vemana University, Proddatur, India
T. Venkateswarlu
Computer Science and Engineering ,Chalapathi Institute of Engineering and Technology, Guntur, India
M. Asha Aruna Sheela
Computer Science and Engineering ,Chalapathi Institute of Engineering and Technology, Guntur, India

Abstract


Cloud computing is increasingly popular in the distribution of the computing environment. Process and implement cloud storage data to become a global movement. Software as an organization Software as a Service (SaaS) has many commercial applications and in our day to day, we can only saythat it is disruptive technology [1]. Data security has become a major problem in the field of cloud ecosystems because data is available in various parts of the world to access the Internet for free as it progresses. The global security record for mid-2018, with a cloud data migration of approximately 86.67%, a global analyst estimates that this range can be 100% [8, 9]. Change the data of two or more people, so that unauthorized people can access real data. There are many different ways to perform this conversion, but the method there has proposed a text input method so that the recipient can access the original information. Encryption has become a solution and alternative encryption algorithms play an important role in the security of data in the cloud. In this process, the process investigation operation is designed to obtain data to avoid breaking an unauthorized person. In this way, you can protect any type of files using the Fibonacci series. The proposed algorithm s is encryption and decryption process takes a less of time compare with other traditional security algorithms.

Keywords


Fibonacci, Security, Cloud, Confidentially, Symmetric Key.