Professional Documents
Culture Documents
(IJIT-V6I5P3) :dr. Sheena Hussaini
(IJIT-V6I5P3) :dr. Sheena Hussaini
I. INTRODUCTION
Cloud processing grows rapidly alongside the of data is vital in cloud condition and dependent on
quick ascent of enormous data. The cloud makes huge that, we propose a proficient system that gives data
data preparing conceivable by giving storage as well as secrecy and honesty in cloud storage in both
computing power [1-10]. Thusly, enormous data transmission as well as storing tasks [58-60]. In
additionally push cloud registering forward, as an ever- addition, this structure will decrease the
increasing number of clients might want to make unpredictability and processing time used to encrypt the
utilization of the cloud to store and process their data data [61]. By understanding the benefits of encryption
[11-16]. Cloud storage administrations are utilized in giving fit security to interesting data, a viable
generally to store and naturally back up subjective data algorithm BE along with optimization is presented.
in manners that are viewed as cost sparing, simple to
utilize and open [17-25]. They additionally encourage II. LITERATURE SURVEY
data sharing among clients and synchronization of
various gadgets. However, there are fundamental data In 2016 Manish M Potey et al. [62], has been proposed
that is processed also stored in the cloud frameworks the data security process in CSP utilizing completely
[26-35]. Losing or uncovering these profitable data will homomorphic encryption. The data is stored in Amazon
have a tremendous terrible effect on the data proprietors Web Service (AWS) open cloud. Client's calculation is
being people or associations. Thus, there is an performed on encrypted data out in the open cloud. At
expanding request to secure data over the cloud the point results are required they can be downloaded
frameworks [36-40]. on a customer machine. In this situation, user’s data is
never stored in plaintext on the open cloud.
The current cloud storage systems utilize same
key size to encrypt all data without taking in thought its Security has been seen as extraordinary compared to
secrecy level which may be infeasible (a few strategies other issues in the enhancement of Cloud Computing.
are Fuzzy personality-based encryption (FIBE), The key issue in viable execution of Cloud Computing
Homomorphic Encryption (HE), Data Encryption is to sufficiently manage the security in the cloud
Standard (DES)) [41-49]. Treating the low and high applications, [63] ECC can be used as a piece of mobile
classified data by a similar route and at a similar computing, remote sensor frameworks, and server-
security level will include superfluous overhead also based encryption, image encryption and its application
increment the processing time [50-56]. Inspired by the in each field of correspondence.
above realities, this paper concentrated on two vital
The cloud data strategies and security in virtual
parts of data computing, security along with capacity
condition [64]. To give data storage and security in the
[57]. The classification
cloud, they exhibited RSA open key cryptosystem.
Further, portrays the security administrations
incorporates key age, encryption, and decryption in
virtual condition.
32 bit 32 bit
64 Bit F F 64 Bit
plain 15 more cipher
text iteration text
32 bit
32 bit
REFERENCE
[1] Chakchai So-In, Tri Gia Nguyen, Gia Nhu
Nguyen: Barrier Coverage Deployment
Algorithms for Mobile Sensor Networks.
Journal of Internet Technology 12/2017;
18(7):1689-1699.
[2] Suresh, G., Epsiba, P., & Kumaratharan, N.
(2016). Content based Image Retrieval Based
on Curvelet and PCA using HTF. Asian Journal
of Research in Social Sciences and
Humanities, 6(8), 2165-2176.
[3] Shankar, K., Zhang, Y., Liu, Y., Wu, L., &
Chen, C. H. (2020). Hyperparameter tuning
deep learning for diabetic retinopathy fundus
image classification. IEEE Access, 8, 118164-
118173.
Fig 2: Encryption and Decryption Time Analysis
[4] Kumar, M. R., Lenine, D., & Babu, C. S.
The encryption, decryption and execution time (2011). A variable switching frequency with
analysis of cloud data security is demonstrated in table boost power factor correction
2 and the graphical representation of encryption and converter. Telkomnika, 9(1), 47.
decryption time for different file size (Mb) are [5] Lenine, D., Babu, C. S., & Shankaraiah, G.
illustrated in figure 2. The performance of proposed (2012). Performance Evaluation of Fuzzy and
optimal blowfish algorithm is analyzed and compared PI Controller for Boost Converter with Active
with existing algorithms like blowfish, RSA [13] and PFC. International Journal of Power Electronics
AES [14]. Results conclude that the optimal blowfish and Drive Systems, 2(4), 445.
encryption technique achieves minimum time to [6] Kathiresan, S., Sait, A. R. W., Gupta, D.,
encrypt, decrypt and execute the data. Lakshmanaprabu, S. K., Khanna, A., & Pandey,
H. M. (2020). Automated detection and
classification of fundus diabetic retinopathy
images using synergic deep learning
model. Pattern Recognition Letters.
[7] Ezhilarasu, P., & Krishnaraj, N. (2015). Triple search-a review. International Journal of
Substring Based Classification for Science, Engineering and Computer
Nondeterministic Finite Technology, 5(5), 116.
Automata. IJAER, 10(59), 177-82. [18] Suresh, G., Epsiba, P., Sivanandam, S. N., &
[8] Epsiba, P., Kumaratharan, N., & Suresh, G. Rajaram, M. (2011). Block Based Motion
(2020). A novel discrete CURVELET transform Estimation using FWS-LMedS Algorithm for
and modified WHOG for video surveillance Video Compression. European Journal of
services. Concurrency and Computation: Scientific Research, 49(4), 533-541.
Practice and Experience, 32(4), e5046. [19] Shankar, K., Lakshmanaprabu, S. K., Gupta, D.,
[9] Shankar, K., & Elhoseny, M. (2019). Trust Khanna, A., & de Albuquerque, V. H. C.
Based Cluster Head Election of Secure Message (2020). Adaptive optimal multi key based
Transmission in MANET Using Multi Secure encryption for digital image
Protocol with TDES. J. UCS, 25(10), 1221- security. Concurrency and Computation:
1239. Practice and Experience, 32(4), e5122.
[10] Le, D.-N.a, Kumar, R.b, Nguyen, G.N., [20] Lenine, D., Babu, C. S., & Kumari, J. S. (2010,
Chatterjee, J.M.d, Cloud Computing and October). A static improvement of predictive
Virtualization, DOI: 10.1002/9781119488149, control for single phase voltage fed power
Wiley. factor correction converters. In 2010
[11] Kumari, J. S., Babu, C. S., Lenine, D., & International Conference on Advances in
Lakshman, J. (2009, December). Improvement Recent Technologies in Communication and
of static performance of multilevel inverter for Computing (pp. 116-120). IEEE.
single-phase grid connected photovoltaic [21] Shankar, K., Elhoseny, M., Kumar, R. S.,
modules. In 2009 Second International Lakshmanaprabu, S. K., & Yuan, X. (2020).
Conference on Emerging Trends in Engineering Secret image sharing scheme with encrypted
& Technology (pp. 691-697). IEEE. shadow images using optimal homomorphic
[12] Senthil Kumar, B. V., Kumar, A., & Suresh, G. encryption technique. Journal of Ambient
(2016). Functional equations related to spatial Intelligence and Humanized Computing, 11(5),
filtering in image enhancement. Int. J. Control 1821-1833.
Theory Appl, 9(28), 555-564. [22] Reddy, J. N., Lenine, D., & Kumar, M. V.
[13] Shankar, K., Lakshmanaprabu, S. K., Khanna, (2018). Experimental Study of Seven Level
A., Tanwar, S., Rodrigues, J. J., & Roy, N. R. Magnetic Coupled Impedance Source Inverter.
(2019). Alzheimer detection using Group Grey [23] Suresh, G. (2009). IMAGE AND VIDEO
Wolf Optimization based features with CODING WITH A NEW WASH TREE
convolutional classifier. Computers & ALGORITHM FOR MULTIMEDIA
Electrical Engineering, 77, 230-243. SERVICES 1.
[14] Epsiba, P., Suresh, G., & Kumaratharan, N. [24] Shankar, K., Elhoseny, M., Chelvi, E. D.,
(2020). Edge Detection-Based Depth Analysis Lakshmanaprabu, S. K., & Wu, W. (2018). An
Using TD-WHOG Scheme. In Intelligent efficient optimal key based chaos function for
Computing in Engineering (pp. 397-407). medical image security. IEEE Access, 6,
Springer, Singapore. 77145-77154.
[15] Anand Nayyar, Vikram Puri, Nhu Gia Nguyen, [25] EPSIBA, P., SUBATHRA, S., SARDAR
BioSenHealth 1.0: A Novel Internet of Medical BASHA, N., SURESH, G., &
Things (IoMT) Based Patient Health KUMARATHARAN, N. (2013). METADATA
Monitoring System, Lecture Notes in Networks BASED HIGH QUALITY IMAGE/VIDEO
and Systems. Springer, 2019 STREAMING USING CURVELET
[16] Kumari, J. Surya, Ch Sai Babu, and Mr D. TRANSFORM. Journal of Theoretical &
Lenine. "An Enhancement of Static Applied Information Technology, 57(2).
Performance of Multilevel Inverter for Single [26] Lopez-Martinez, F., Schwarcz, A., Núñez-
Phase Grid Connected Photovoltaic Valdez, E. R., & Garcia-Diaz, V. (2018).
modules." International journal of Recent Machine learning classification analysis for a
Trends in Engineering, Academy Publishers, hypertensive population as a function of several
Finland 3.3 (2010): 20-24. risk factors. Expert Systems with Applications,
[17] Ezhilarasu, P., Krishnaraj, N., & Babu, S. V. 110, 206-215.
(2015). Applications of finite automata in text
[27] Ezhilarasu, P., Prakash, J., Krishnaraj, N., Classifier and Grey Wolf Optimization
Satheesh Kumar, D., Sudhakar, K., & Algorithm Based Intelligent Classification
Parthasarathy, C. (2014). A Novel Approach to Algorithm for Chronic Kidney Disease."
Classify Nondeterministic Finite Automata Journal of Medical Imaging and Health
Based on More than Two Loops and its Informatics 10.10 (2020): 2297-2307.
Position. SSRG International Journal of [36] Sreenivas, M. B. S., Babu, C. S., & Lenine, M.
Computer Science and Engineering (SSRG- D. (2012). Design and Analysis of Predictive
IJCSE), 1(10), 46-49. control using PI controller for Boost Converter
[28] Suresh, G., Epsiba, P., Rajaram, D. M., & with Active Power Factor
Sivanandam, D. S. (2010). Scalable ACC-DCT Correction. International Journal of Emerging
Based Video Compression Using Up/Down Technology and Advanced Engineering, 2(6).
Sampling Method. International Journal of [37] Krishnaraj, N., Ezhilarasu, P., Karthik, S., &
Computer and Network Security, 2(6). Prabhakar, M. (2016). J,” Enhancing Security in
[29] Lenine, D., Babu, C. S., & Kumari, J. S. (2010, Mobile Devices through Multimodal
October). A static improvement of predictive biometrics”. Middle-East Journal of Scientific
control for single phase voltage fed power Research, 23(8), 1598-1603.
factor correction converters. In 2010 [38] Shankar, K., Lakshmanaprabu, S. K., Gupta, D.,
International Conference on Advances in Maseleno, A., & De Albuquerque, V. H. C.
Recent Technologies in Communication and (2020). Optimal feature-based multi-kernel
Computing (pp. 116-120). IEEE. SVM approach for thyroid disease
[30] Van, V.N., Chi, L.M., Long, N.Q., Nguyen, classification. The Journal of
G.N., Le, D.-N, A performance analysis of Supercomputing, 76(2), 1128-1143.
openstack open-source solution for IaaS cloud [39] Suresh, G., Epsiba, P., Rajaram, M., &
computing, Advances in Intelligent Systems Sivanandam, S. N. (2010). An improved low
and Computing, 380, pp. 141-150. complex spatially scalable ACC-DCT based
[31] Suresh, G., Epsiba, P., Rajaram, M., & video compression method. IJCSE)
Sivanandam, S. N. (2010, July). A low complex International Journal on Computer Science and
scalable spatial adjacency ACC-DCT based Engineering, 2(03).
video compression method. In 2010 Second [40] Lambert, J. R., Arulanthu, P., & Perumal, E.
International conference on Computing, Identification of Nominal Attributes for
Communication and Networking Intelligent Classification of Chronic Kidney
Technologies (pp. 1-6). IEEE. Disease using Optimization Algorithm.
[32] Nieto, Y., García-Díaz, V., Montenegro, C., & [41] Bhateja, V., Gautam, A., Tiwari, A., Nhu, N.G.,
Crespo, R. G. (2019). Supporting academic Le, D.-N, Haralick features-based classification
decision making at higher educational of mammograms using SVM, Advances in
institutions using machine learning-based Intelligent Systems and Computing, Volume
algorithms. Soft Computing, 23(12), 4145- 672, 2018, Pages 787-795.
4153. [42] López-Martínez, F., Núñez-Valdez, E. R.,
[33] Shankar, K., Elhoseny, M., Lakshmanaprabu, S. Gomez, J. L., & García-Díaz, V. (2019). A
K., Ilayaraja, M., Vidhyavathi, R. M., Elsoud, neural network approach to predict early
M. A., & Alkhambashi, M. (2020). Optimal neonatal sepsis. Computers & Electrical
feature level fusion based ANFIS classifier for Engineering, 76, 379-388.
brain MRI image [43] Lenine, D., & Bau, S. (2009). Comparison
classification. CONCURRENCY AND between variable switching frequency and timer
COMPUTATION-PRACTICE & controller with constant switching frequency
EXPERIENCE, 32(1). techniques for PFC converters. International
[34] Dey, N., Ashour, A.S., Chakraborty, S., Le, D.- Journal of Computer and Electrical
N., Nguyen, G.N, Healthy and unhealthy rat Engineering, 1(2), 183-187.
hippocampus cells classification: A neural [44] Shankar, K., & Eswaran, P. (2017). RGB based
based automated system for Alzheimer disease multiple share creation in visual cryptography
classification, Journal of Advanced Microscopy with aid of elliptic curve cryptography. China
Research, 11(1), pp. 1-10 Communications, 14(2), 118-130.
[35] Rubini, L. Jerlin, and Eswaran Perumal. [45] Ezhilarasu, P., Thirunavukkarasu, E.,
"Hybrid Kernel Support Vector Machine Karuppusami, G., & Krishnaraj, N. (2015).
[65] Tolosa, J. B., Sanjuán‐Martínez, O., [74] Le Nguyen, B., Lydia, E. L., Elhoseny, M.,
García‐Díaz, V., G‐Bustelo, B. C. P., & Pustokhina, I., Pustokhin, D. A., Selim, M. M.,
Lovelle, J. M. C. (2011). Towards the ... & Shankar, K. (2020). Privacy Preserving
systematic measurement of ATL transformation Blockchain Technique to Achieve Secure and
models. Software: Practice and Experience, Reliable Sharing of IoT Data. CMC-
41(7), 789-815. COMPUTERS MATERIALS &
[66] Raj, R. J. S., Shobana, S. J., Pustokhina, I. V., CONTINUA, 65(1), 87-107.
Pustokhin, D. A., Gupta, D., & Shankar, K. [75] Ezhilarasu, P., & Krishnaraj, N. (2015).
(2020). Optimal Feature Selection-Based Applications of Finite Automata in Lexical
Medical Image Classification Using Deep Analysis and as a Ticket Vending Machine–A
Learning Model in Internet of Medical Review. Int. J. Comput. Sci. Eng.
Things. IEEE Access, 8, 58006-58017. Technol, 6(05), 267-270.
[67] García-Díaz, V., Espada, J. P., Crespo, R. G.,
G-Bustelo, B. C. P., & Lovelle, J. M. C. (2018).
An approach to improve the accuracy of
probabilistic classifiers for decision support
systems in sentiment analysis. Applied Soft
Computing, 67, 822-833.
[68] Mohanty, S. N., Ramya, K. C., Rani, S. S.,
Gupta, D., Shankar, K., Lakshmanaprabu, S. K.,
& Khanna, A. (2020). An efficient Lightweight
integrated Blockchain (ELIB) model for IoT
security and privacy. Future Generation
Computer Systems, 102, 1027-1037.
[69] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z.
Hybrid Soft Computing Approach for
Prediction of Cancer in Colon Using
Microarray Gene Data. Current Signal
Transduction Therapy, 11(2).
[70] Cueva-Fernandez, G., Espada, J. P., García-
Díaz, V., García, C. G., & Garcia-Fernandez, N.
(2014). Vitruvius: An expert system for vehicle
sensor tracking and managing application
generation. Journal of network and computer
applications, 42, 178-188.
[71] Anand Nayyar, Vikram Puri, Nhu Gia Nguyen,
Dac Nhuong Le, Smart Surveillance Robot for
the Real Time Monitoring and Control System
in Environment and Industrial Applications,
Advances in Intelligent System and Computing,
pp 229-243, Springer
[72] Sankhwar, S., Gupta, D., Ramya, K. C., Rani,
S. S., Shankar, K., & Lakshmanaprabu, S. K.
(2020). Improved grey wolf optimization-based
feature subset selection with fuzzy neural
classifier for financial crisis prediction. Soft
Computing, 24(1), 101-110.
[73] García-Díaz, V., Fernández-Fernández, H.,
Palacios-González, E., G-Bustelo, B. C. P.,
Sanjuán-Martínez, O., & Lovelle, J. M. C.
(2010). Talisman mde: Mixing MDE principles.
Journal of Systems and Software, 83(7), 1179-
1191.