An Efficient and Secured Data Loss Prevention using Hybrid Cryptosystem for Secure Data Storage
V.Krishna Reddy1, A.Devi Chandana2, E.Sri Pujitha3, M.Pranitha Shravani4
1Dr. V. Krishna Reddy, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (A.P), India.
2A. Devi Chandana, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (A.P), India.
3E. Sri Pujitha, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (A.P), India.
4M. Pranitha Shravani, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (A.P), India.
Manuscript received on 25 May 2019 | Revised Manuscript received on 03 June 2019 | Manuscript Published on 22 June 2019 | PP: 434-437 | Volume-8 Issue-3S, February 2019 | Retrieval Number: C10910283S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing has transformed into an irreplaceable bit of a substantial part of the private, open affiliations that are being used for data accumulating and recuperation. There are various utilization of circulated processing and furthermore comprehensively used in the exceedingly mystery national organizations that are available like military ,treasury to secure the private information. The circulated processing for example like Google drive, Amazon Web Service and Microsoft Azure are important for affiliations and end-customers. Using the Cloud by making sense of and its organizations, affiliation/end-customers can store their data. There are diverse challenges amid saving affiliations incredibly arranged records in servers. Therefore, the goal of this paper is to give an abnormal state structure to a capacity framework providing security and individual protection. In spite of the fact that servers are profoundly secured and protected against unapproved access, there are episodes where private documents put away on servers are gotten to by the upkeep staffs. Subsequently this examination paper gives early on structure to completely assurance of records put away in the server by utilizing Hybrid Cryptosystem In this paper we are finding the touchy data from the document and it ought to encode by the deletion encoding after that it’s scrambled by the utilizing MD5 for residual information it ought to scrambled by the sha-1 at that point joined the information and put away into the cloud.
Keywords: Cryptography, Encryption, Decryption, Security.
Scope of the Article: Storage-Area Networks