The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to convert the cipher text using a secretkey block cipher of 64-bits. This system is designed to increase security and to improve the transmission performance. Storage-cheating attack model and Privacy-cheating attack model are implemented to protect the data on cloud. Findings: This system increases security and improves transmission performance. The blowfish algorithm is secure against unauthorized attacks and runs faster than the popular existing algorithms. Storage-cheating attack model and Privacy-cheating attack model provides the data confidentiality for data stored in the cloud in higher way. Improvements: The system can be implemented in real cloud system in the future.

Keywords

Blowfish Algorithm, Cloud Computing, Data Storage in Cloud, Linguistic Steganography, Two Levels Security.
User