The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System

Cloud computing is the method of employing a set-up of isolated servers to be hosted on the web to accumulate and supervise information instead of an area server or a private laptop. Storage of data in cloud sometimes creates security issues in the data stored so, security in provided for the stored cloud data. In order to provide secured cloud data transaction, our proposed method initially verifies the authentication of the user followed by splitting the information of the user using pattern- matching technique. The blowfish computation is used to encrypt the alienated data. After encryption, resorting to the selection of the optimal position of a data center by means of the cross grey wolf optimization and firefly technique is done. Finally, the encrypted data are stored at an optimal location in the cloud. Then the data split column wise and separated at an optimal location in the cloud, this method is highly secured since the user cannot retrieve the file without authentication verification.


[1] Batista B., Ferreira C., Segura D., Filho D., and Peixoto M., “A QoS-Driven Approach for Cloud Computing Addressing Attributes of Performance and Security,” Future Generation Computer Systems, vol. 68, pp. 260-274, 2017.

[2] Casola V., Benedictis A., Rak M., and Rios E., “Security-by-Design in Clouds: A Security- SLA Driven Methodology to Build Secure Cloud Applications,” Procedia Computer Science, vol. 97, pp. 53-62, 2016.

[3] Chang V., Kuo Y., and Ramachandran M., “Cloud Computing Adoption Framework: A Security Framework for Business Clouds,” 904 The International Arab Journal of Information Technology, Vol. 17, No. 6, November 2020 Future Generation Computer Systems, vol. 57, pp. 24-41, 2016.

[4] Cotroneo D., Paudice A., and Pecchia A.,“Automated Root Cause Identification of Security Alerts: Evaluation in A Saas Cloud,” Future Generation Computer Systems, vol. 56, pp. 375-387, 2016.

[5] Cusack B. and Ghazizadeh E.,“Evaluating Single Sign-on Security Failure in Cloud Services,” Business Horizons, vol. 59, no. 6, pp. 605-614, 2016.

[6] Grobauer B., Walloschek T., and Stocker E., “Understanding Cloud Computing Vulnerabilities,” IEEE Security and Privacy, vol. 9, no. 2, pp. 50-57, 2011.

[7] Gupta P. and Kumar S., “AComparative Analysis of SHA andMD5 Algorithm,” International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 4492-4495, 2014.

[8] Han K., Li Q., and Deng Z., “Security and Efficiency Data Sharing Scheme for Cloud Storage,” Chaos, Solitons and Fractals, vol. 86, pp. 107-116, 2016.

[9] Iqbal S., Kiah L., Dhaghighi B., Hussain M., Khan S., Khan M., and Choo K., “On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention As A Service,” Journal of Network and Computer Applications, vol. 74, pp. 9-120, 2016.

[10] Kalpana P. and Singaraju S., “Data Security in Cloud Computing using RSA Algorithm,” International Journal of Research in Computer and Communication Technology, vol. 1, no. 4, pp.143- 146, 2012.

[11] Khan M., “A Survey of Security Issues for Cloud Computing,” Journal of Network and Computer Applications, vol. 71, pp. 11-29, 2016.

[12] Kritikos K. and Massenet P., “An Integrated Meta- model for Cloud Application Security Modeling,” Procedia Computer Science, vol. 97, pp. 84-93, 2016.

[13] Kritikos K., KirkhamT., Kryza B., and Massenet P., “Towards a Security-Enhanced Paas Platform For Multi-Cloud Applications,” Future Generation Computer Systems, vol. 67, pp. 206-226, 2017.

[14] Kuyoro S., Folami I., and Oludele A., “Cloud Computing Security Issues and Challenges,” International Journal of Computer Networks, vol. 3, no. 5, pp. 247-255, 2011.

[15] Li Z., Ge J., Yang H., Huang L., Hu H., Hu H., and Luo B., “A security and Cost Aware Scheduling Algorithm for Heterogeneous Tasks of Scientific Workflow in Clouds,” Future Generation Computer Systems, vol. 65, pp. 140-152, 2016.

[16] Lyu C., Sun S., Zhang Y., Pande A., Lu H., and Gu D., “Privacy-Preserving Data Sharing Scheme over Cloud for Social Applications,” Journal of Network and Computer Applications, vol. 74, pp. 44-55, 2016.

[17] Mahendran N., “Collaborative Location Based Sleep Scheduling with Load Balancing in Sensor-Cloud,” International Journal of Computer Science and Information Security, vol. 14, pp. 20-27, 2016.

[18] Mahendran N. and Priya R., “Sleep Scheduling Schemes Based on Location of Mobile User in Sensor-Cloud,” International Journal of Computer, Electrical, Automation, Control and Information Engineering, World Academy of Science, Engineering and Technology, vol. 10, no. 3, pp. 615-620, 2016.

[19] Mal W., Han Z., Li X., and Liu J., “A Multi- Level Authorization Based Tenant Separation Mechanism in Cloud Computing Environment,” China Communications, vol. 13, no. 5, pp. 162-171, 2016.

[20] Modic J.,Trapero R., Taha A., Luna J., Stopar M., and Suri N., “Novel Efficient Techniques for Real-Time Cloud Security Assessment,” Computers and Security, vol. 62, pp. 1-18, 2016.

[21] Niu S., Tu S., and Huang Y., “An Effective and Secure Access Control System Scheme in the Cloud,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 524-528, 2015.

[22] Ravali K., Neelima P., Sruthi P., Dileep P., and Manasa B., “Implementation of Blowfish Algorithm for Efficient Data Hiding in Audio,” Journal of Computer Science and Information Technologies, vol. 5, no. 1, pp. 748-750, 2014.

[23] Sachdev A. and Bhansali M., “Enhancing Cloud Computing Security using AES Algorithm,” International Journal of Computer Applications, vol. 67, no. 9, pp. 19- 23, 2013.

[24] Shah P. and Javheri S., “Data Security in Cloud Storage using Role-Based Access Control and Time-Based Assured Deletion,” International Journal of Computer Application, vol. 5, no. 6, pp. 1-5, 2015.

[25] Shanmugam S. and Iyengar S., “Improving Energy Efficiency and Impairing Environmental Impacts on Cloud Centers by Transforming Virtual Machine into Self- Adaptive Resource Container,” The International Arab Journal of Information Technology, vol. 16, no. 4, pp. 617-623, 2019.

[26] Singh S., Jeong Y., and Park J., “A survey on Cloud Computing Security: Issues, Threats, and Solutions,” Journal of Network and Computer Applications, vol. 75, pp. 200-222, 2016.

[27] Srivastav S. and Verma N., “Improving Data Security in Cloud Computing using RSA Algorithm and MD5 Algorithm,” International Journal of Innovative Research in Science, Engineering and Technology, vol. 4, no. 7, pp. Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System 905 5450-5457, 2015.

[28] Suresh K. and Prasad K., “Security Issues and Security Algorithms in Cloud Computing,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 10, pp. 110-114, 2012.

[29] Vasudevan S., Vivek C., and Srivathsan S., “An Intelligent Boxing Application through Augmented Reality for two users-Human Computer Interaction Attempt,” Indian Journal of Science and Technology, vol. 8, no. 34, pp. 1-7, 2015.

[30] Vasudevan S. and Vivek C., “An Intelligent Attempt to Export Files into Cloud in Handheld Devices through Gesture Recognition,” Indian Journal of Science and Technology, vol. 8, no. 34, pp. 1-8, 2015.

[31] Zhang Y., Chen X., Li J., Wong D., Li H., and You I., “Ensuring Attribute Privacy Protection and Fast Decryption for Outsourced Data Security in Mobile Cloud Computing,” Information Sciences, vol. 379, pp. 42-61, 2017.

[32] Zissis D. and Lekkas D., “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583-592, 2012. Dinesh Elangovan obtained his Bachelor’s degree in Electronics and Communication from Anna University, Chennai. Then he obtained his Master’s degree in Applied Electronics and PhD doing in Information & Communication majoring in Cloud Computing, Big Data Analytics and Networking both from Anna University, Chennai, Tamilnadu, India. He has also obtained Computer Networking professional qualifications. Currently, he is a SeniorAssistant Professor at the Faculty of Electronics and Communication Engineering, M.Kumarasamy College of Engineering, Karur. His specializations include Cloud Security, networking, and Virtual Reality. His current research interests are Cloud Data Security Formation, Public Key Infrastructure, Network Security, Authentication Server, Virtual Simulation, Virtual Reality and Cryptographic Techniques. Ramesh Muthiya received the B.E. degree in Electronics and Communication Engineeringfrom National Institute of Technology (Formerly REC), Trichy, India, in 2001 and the M.E. degree in Applied Electronics from the Anna University, Chennai, India, in 2004. He was awarded his Ph.D. degree in Information and Communication Engineering from Anna University, Chennai, India, in 2012.; He is currently working as Professor in the Department of Electronics and Communication Engineering at K.P.R Institute of Engineering and Technology, Coimbatore, India. He has published 69 articles in international and national journals and more than 33 papers in international and national conferences. His current research focuses are in Image processing, VLSI design, Embedded systems and Wireless networks. He is a life member of the ISTE, a member of the IAENG and a life member of the IETE.