000 02347nam a22001577a 4500
999 _c22715
_d22715
020 _a978-8195995950
082 _a004
_bKAL
100 _aKalyan Kumar, A.S.
245 _aCloud computing and cyber security :
_ba secure crypto-based data outsourcing and sensitive data monitoring in cloud /
_cA.S. Kalyan Kumar, T. Abdul Razak
260 _aNew Delhi :
_bAdhyyan Books ,
_c2022.
300 _a163 pages ;
_billustrations ;
_c23 cm.
520 _aThe aim of this book is to meet the brief objective, several sub-objectives are often developed to reinforce the info security and privacy in cloud computing such as (i) to develop a lightweight model for data anonymization and unlikability when data is outsourced to the cloud. () To develop a method using an appropriate encryption algorithm to secure the privacy of sensitive data in the cloud. (iii) To validate the proposed model and the method for security and privacy of data outsourcing in the cloud with recent benchmarks. The security and privacy may be enhanced by encrypting the user data before sending it to the server in the cloud. The present methodologies have few challenges in terms of security, execution time, forced to take care of an equivalent length of the key and therefore the plain text, more computational cost, and inadequate key generation. The research provides data anonymity and unlikability to a foreign cloud server, and hence Secure Crypto-based Data Outsourcing Model (SCDOM) has been proposed. For encryption and decryption, the Blowfish technique is used. The Message Authentication Code (MAC) is generated for security, and it avoids the usage of complicated cryptographic key certificates. The lightweight models are inclined to mitigate the computation complexity, time, and cost. During encryption, 5 keys are generated to enhance privacy. While applying the 1st key, if any unauthorized attack occurs then this key can be rejected and the next key can be considered for verification. The encryption and decryption are done by using the Honeybee algorithm. The proposed methodology mainly stimulates potential security against intruders. It maintains parallelism between the key and length of plain text and mainly mitigates the computational cost and execution time.
650 _aCloud computing
700 _aAbdul Razak, T.
942 _2ddc
_cBK