Loading

Performance Improvement of MONCRYPT SSA Over Data Obfuscation in Cloud Security
D. Samatha1, D.Sindhura2, K.Kalpana3, T.Santhi sri4

1D.Samatha, Department of CSE, Koneru Lakshmaiah Education Foundation, (A.P), India.
2D.Sindhura, Department of CSE, Koneru Lakshmaiah Education Foundation, (A.P), India.
3K. Kalpana, Department of CSE, Koneru Lakshmaiah Education Foundation, (A.P), India.
4T. Santhi sri, Department of CSE, professor at Koneru Lakshmaiah Education Foundation, (A.P), India.
Manuscript received on November 22, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 1006-1010 | Volume-9 Issue-2, December, 2019. | Retrieval Number:  B2916129219/2020©BEIESP | DOI: 10.35940/ijeat.B2916.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing means a set of Information Technology services offered to the users over the web on a rented base. Cloud computing has several benefits like pliable, planning, scalability, combination, and rebate .Security is one in every of the most challenges that hinder the expansion of cloud computing. This study introduces a brief analysis of the issues and challenges of cloud computing security. “Cloud computing services will be varied and must be defined from the perspective of the users of the service. Security of information keep within the cloud is most imperative test publically cloud setting. Due the security issues, information are uncovered by Cloud Service Providers (CSP) and others clients of cloud. To verify the information from security lapse, we are using Security Algorithm , named MON crypt SSA to protect the data in cloud depository . The proposed technique is depend on information jumbling strategies. The MON crypt SSA depends on Security as a Service (SEaaS). In this we can utilize the JAVA to recreation of results is utilized for measure the security of propose and existing jumbling procedures. MON crypt contrast and present jumbling procedure that is Base64Encoding .The anticipated strategy gives better and shrewd security in examination with present obscurity strategies. Not at all like present system, MON crypt diminishes the size of information that will be transferred in distributed storage.
Keywords: Security service algorithm, Obfuscation, MON crypt SSA , Encoding