Enhancing Data Retrieval Using Fuzzy Keywords and Data Security Using Feistal Encryption Algorithm

The algorithm proposed is to ensure safety and guarantee of clients information on the cloud. The conventional system of replication based dispersion hence will not be required anymore by using deletion revising code. As the client data increases in size or importance, data repetition is a method to be used to tackle situations like server crashes and more. Client has information and is highly depended on cloud for its retrieval. The current system is of a very high cost and not so efficient. Fuzzy keywords help in searching and providing more probable outcome as a result enhancing the searching efficiency and capability and lower data loss. Also to enhance the security of the data over the cloud, tiny and blowfish algorithms are used to encyrypt data file which are shared over the cloud. For this, an OTP will be generated and entered to access and decrypt the data on receiver end. Information stockpiling nowadays should become more predictable and basic because data is made accessible to client only when required in cases of distributed storage systems. Hence cloud comes into play as in our application we use cloud as the put away stage is now the cloud.

[1]  Douglas F. Parkhill,et al.  The Challenge of the Computer Utility , 1966 .

[2]  Tanupriya Choudhury,et al.  An Approach to Improve Task Scheduling in a Decentralized Cloud Computing Environment , 2012 .

[3]  Tanupriya Choudhury,et al.  A performance based comparison of various symmetric cryptographic algorithms in run-time scenario , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).

[4]  Tanupriya Choudhury,et al.  An Advanced Security - A Two-Way Password Technique for Cloud Services , 2014 .

[5]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[6]  Tanupriya Choudhury,et al.  Enhanced security protocol for mobile computation offloading and accessing data offline , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[7]  Alan L. Cox,et al.  Achieving 10 Gb/s using safe and transparent network interface virtualization , 2009, VEE '09.

[8]  Tanupriya Choudhury,et al.  Proposal and implementation of cloud security algorithm to enhance the security of the layers , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).

[9]  Tanupriya Choudhury,et al.  An efficient scheme to secure cloud with diversified fortified mechanisms , 2017, 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC).

[10]  F. John Krautheim,et al.  Private Virtual Infrastructure for Cloud Computing , 2009, HotCloud.