Secure Data Transmission in Cloud Computing using Message Storage & Retrieval Algorithms
R Yogesh Rajkumar1, K P Kaliyamurthie2
1R Yogesh Rajkumar*, Research Scholar, BIHER- Bharath Institute of Higher Education and Research, Chennai, India.
2K P Kaliyamurthie, Department of Computer Science and Engineering, BIHER- Bharath Institute of Higher Education and Research, Chennai, India.
Manuscript received on September 23, 2019. | Revised Manuscript received on October 15, 2019. | Manuscript published on October 30, 2019. | PP: 7193-7196 | Volume-9 Issue-1, October 2019 | Retrieval Number: A2064109119/2019©BEIESP| DOI: 10.35940/ijeat.A2064.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Our economic assets are limited, yet our valuation necessitates seems to be boundless. The requirement meant for valuation remedies continues growing inconclusively, no matter the accessibility of assets, the requirement for further continues. Now the cloud does its job, Cloud Computing (CC) acquires its title as a metaphor for the web. In general, the web is spoken to within the system figure like a cloud. The cloud symbol speaks to the entire so as to further objects to facilitate the system function. Various businesses is being gradually moving to the utilization of CC, since CC vows toward slash functional as well as investment expense also all the further significantly consent to Software sectors center around intentional activities as an alternative of maintaining the information hub operating. Guaranteeing the protection of CC is a key aspect within the CC condition, like clients frequently piles up touchy data through cloud repository suppliers, yet those suppliers might be dishonest. On the way to guarantee the protection as well as rightness of users information within the cloud, this document recommends another pattern on behalf of information safety in CC.
Keywords: Cloud Computing, Security, Encryption and Decryption.