International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017
p-ISSN: 2395-0072
www.irjet.net
Ant Colony Model (AnCoMoDaS) for Data Security in Cloud B. Rex Cyril1, DR.S. Britto Ramesh Kumar2 1Research
Scholar and Assistant Professor, Department Of Computer Science, St.Joseph’s College(Autonomous), Trichy, Tamilnadu, India. 2Asst.Professor,
Department of Computer Science, St.joseph’s College(Autonomous) Trichy, Tamilnadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract:After the invention of Cloud Model, awareness of
using common storage in increased. Considering investment for hardware to store mass data as well as to keep secures them cloud provides ease solutions. For the reason data storage in cloud is increased. The previous algorithms for securing the cloud data designed to encrypt the content without any knowledge about the type of data. But the proposed algorithm Ant Colony Model for Data Security in Cloud (AnCoMoDaS) encrypts the content depends the type of content available in the document. So it’s proved that the size and time is reduced than any other previous algorithms. Key Words: Ant Colony, Encryption, Cryptography
1. INTRODUCTION Cloud is nothing but the group of servers and datacenters that are placed at different places and these severs and datacenters are responsible for providing on demand service to its users with help of internet. The service provided by cloud is not present on user’s computer. User has to access these services with help of internet connection through subscribing them. The main advantage of Cloud computing is that it eliminates the need for user to be in same location where hardware software and storage space is physically present. Cloud makes it possible to store and access your data from anywhere anytime without worrying about maintenance of hardware software and storage space. All these services are provided to user at low cost. User has to pay according to storage space he is using. Due to this flexibility everyone is transferring his data on cloud. Security becomes big issue when any one stores its important information to a platform which is not directly controlled by the user and which is far away [1]. While sending of data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. A data is secure, if it fulfils three conditions (i) Confidentiality (ii) Integrity (iii) Availability. Confidentiality means the data is understandable to the © 2017, IRJET
|
Impact Factor value: 5.181
|
receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is a technique of converting data into unreadable form during storage and transmission that it appears waste to intruder. The unreadable form of data is known as cipher text. When data is received by receiver it, will appear in its original form which is known as plain text. Conversion of plain text to cipher text is known as encryption and reverse of this (cipher text to plain) is known as decryption. Encryption takes place at sender’s end whereas decryption takes place at receiver’s end. The rest of the paper is organized as follows. In Section II and III, we have defined the related work and background for the proposed security system respectively. Our proposed system security algorithms and performance analysis are explained in Section IV and V respectively. Finally we conclude in Section VI.
2. RELATED WORK To ensure the data integrity of a file consisting of a finite ordered set of data blocks in cloud server several solutions are defined by Qian Wang et al, in [2]. The first and straight forward solution to ensure the data integrity is, the data owner pre-compute the MACs for the entire file with a set of secrete keys, before our sourcing data to cloud server. During auditing process, for each time the data owner reveals the secret key to the cloud server and ask for new MAC for verification. In this method the number of verification is restricted to the number of secrete keys. Once ISO 9001:2008 Certified Journal
|
Page 1004