Megha Vashishtha, P. Chouksey, D. Rajput, Somula Rama Subba Reddy, M. S. K. Reddy, G. T. Reddy, Harshita Patel
{"title":"Security and detection mechanism in IoT-based cloud computing using hybrid approach","authors":"Megha Vashishtha, P. Chouksey, D. Rajput, Somula Rama Subba Reddy, M. S. K. Reddy, G. T. Reddy, Harshita Patel","doi":"10.1504/ijitst.2021.10040779","DOIUrl":null,"url":null,"abstract":"The combination of RSA and RC4 is accepted for the generation of key to get the superior security method, on image, blowfish algorithm is applied. In this method, initially cloud provider registers the cloud user which authenticates the user, then text and image data can be uploaded in the existing four servers. If those files are demanded by the other cloud user's then data classification encryption standard have been applied. The textual data is practiced with the enhanced RC6 method with key processing method of RC4 and RSA algorithm. These keys are used for the data decryption from the further side. The TA gives the information of the mismatch in the last prefix of the combination of the user detail and the data. If it does not match then the data will be corrupted by the blocker algorithm. The whole parametric comparison implies that the performance of our framework outperforms over traditional techniques.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Internet Technology and Secured Transactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijitst.2021.10040779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 9
Abstract
The combination of RSA and RC4 is accepted for the generation of key to get the superior security method, on image, blowfish algorithm is applied. In this method, initially cloud provider registers the cloud user which authenticates the user, then text and image data can be uploaded in the existing four servers. If those files are demanded by the other cloud user's then data classification encryption standard have been applied. The textual data is practiced with the enhanced RC6 method with key processing method of RC4 and RSA algorithm. These keys are used for the data decryption from the further side. The TA gives the information of the mismatch in the last prefix of the combination of the user detail and the data. If it does not match then the data will be corrupted by the blocker algorithm. The whole parametric comparison implies that the performance of our framework outperforms over traditional techniques.