4239 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: E6720018520/2020©BEIESP DOI:10.35940/ijrte.E6720.018520 Journal Website: www.ijrte.org Data Obfuscation Technique for Security in Cloud Computing

  • Tripathi* D
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is at present a day's changes into the most crushed in marvels to use for enormous scale alliance or for person who need unmistakable structure organizations with least expense. Usually person's data is dealt with on open Cloud which is accessible to everybody for get to. These focal raises some issue in reverse to adaptable organizations gave by cloud suppliers, similar to Confidentiality, Integrity, Availability, Authorization and some more. Starting late, Lots of decisions are open to guarantee the data and most perfect ways is to use encryption. Encryption can't give enough confirmation while contemplating heaps of customers' fragile data. It in like manner eats up greater chance to perform encryption and translating process for every single inquiry. Moreover it is definitely not an OK practice to contemplate customer driven considering the way that once customer data is moved on Cloud premises, customer doesn't have direct control over this data. To empty load of Cloud server likewise to give acceptable security to customer's data, we propose a methodology by joining the two procedures viz. Jumbling and Encryption in this assessment paper. Customer data may be scrambled if protection is needed for its records or reports and the SaaS Cloud organization is reviewed using obscurity techniques. Using this two-way approach, we may assume that the proposed agreement provides sufficient protections for darkened access and safety of even open data on cloud servers. Our point is additionally to give appropriate assessment on data disordering for security in cloud computing.

Cite

CITATION STYLE

APA

Tripathi*, Dr. D. R. (2020). 4239 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: E6720018520/2020©BEIESP DOI:10.35940/ijrte.E6720.018520 Journal Website: www.ijrte.org Data Obfuscation Technique for Security in Cloud Computing. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 4239–4244. https://doi.org/10.35940/ijrte.e6720.018520

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free