Loading

Upgrade-Data Security in Cloud by Machine Learning and Cryptography Techniques
Adnaan Arbaaz Ahmed1, M.I.Thariq Hussan2, Venkateswarlu Bollapalli3

1Adnaan Arbaaz Ahmed, Scholar, Department of Information Technology, Guru Nanak Institutions Technical Campus, Hyderabad, India.
2Dr. M.I. Thariq Hussan, Professor & Head, Department of Information Technology, Guru Nanak Institutions Technical Campus, Hyderabad, India.
3Venkateswarlu Bollapalli, Assistant Professor, Department of Information Technology, Guru Nanak Institutions Technical Campus, Hyderabad, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 2728-2732 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8395088619/2019©BEIESP | DOI: 10.35940/ijeat.F8395.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The term cloud computing is referred as the shared pool of customizable computer resources and high quantity services which can easily be provisioned with less management endeavours via internet. It transfigured the mode associations reach IT, which enables them to be more perceptive, launch new business models, and minimise the IT costs. These technologies are to be administrated in an interdisciplinary collection of architectures, characterized into various deployment and service models, and can synchronize with other related technologies. The widespread issues with cloud computing are security, reliability, data privacy and anonymity. Cloud computing provides a way to share distributed sources and services that are owned by different organizations or sites. Since it shares distributed resources via network in open environment that results in security issues. In this paper, our aim is to upgrade the security of data in the cloud and also to annihilate the difficulties related to the data security with encipher algorithm. In our proposed plan, some key services of security like authentication and cryptographic techniques are assigned in cloud computing environment.
Keywords: Cloud computing, cryptography, data classification, decryption, encryption.