Design and Implementation of Crypt Analysis
of Cloud Data Intrusion Management System
Dinesh Elangovan and Ramesh Muthiya
Department of Electronics and
Communication Engineering, Anna University, India
Abstract: Cloud computing is the
method of employing a set-up of isolated servers to be hosted
on the web to accumulate and supervise information instead
of an area server or a private laptop. Storage of data in
cloud sometimes creates security issues in the data stored so, security in
provided for the stored cloud data. In order to provide secured cloud data
transaction, our proposed method initially verifies the authentication of the
user followed by splitting the information of the user using pattern-matching
technique. The blowfish computation is used to encrypt the alienated data.
After encryption, resorting to the selection of the optimal position of a data
center by means of the cross grey wolf optimization and firefly technique is
done. Finally, the encrypted data are stored at an optimal location in the
cloud. Then the data split column wise and separated at an optimal location in
the cloud, this method is highly secured since the user cannot retrieve the
file without authentication verification.
Keywords: Cloud computing,
Pattern Matching Technique, Blowfish Algorithm, Hybrid Grey Wolf Optimization
and Firefly Technique.
Received July 11, 2019; accepted May 10, 2020