Background/Objectives: The main objective is to provide security using Magnified Cipher Block Chaining mode-DES to ensure secure data on cloud. Methods: In this work we have to find how the data is converted into binary and splits into blocks of particular size. By using Magnified Cipher block chaining mode-DES we encrypt data and store into cloud. We send the key to the receiver then he/she access the data from the cloud and decrypt the data. By this methodology we can ensure high security because even cloud server cannot access data. Findings: In this research, many encryption and decryption algorithms like AES, DES, RSA, Cipher Block Chaining modes have been taken into account. By using the DES operation we proposed a magnified Cipher Block Chaining mode –DES to find out how the data is divided into blocks and how the DES operation will perform. In this work we also find out the several algorithms like AES, DES etc. DES algorithm has been designed to provide more secure because the data is to be perform 16 rounds for encryption and decryption. In our work we divide the data into blocks and encrypt the data using DES algorithm and sent to the next block depending on the midvalue+position. Like this all the blocks of the data are encrypted and decrypted. By this methodology we can provide more secure because we are storing the encrypted data in the cloud so that even cloud server cannot access. Improvement: In order to provide security we propose a Magnified Cipher Block Chaining mode using DES. On the basis of mid value + positions the data is encrypted and decrypted.
[1]
Anshu Parashar,et al.
Secure User Data in Cloud Computing Using Encryption Algorithms
,
2013
.
[2]
Kuo Tsang Huang.
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
,
2013
.
[3]
D. Helen,et al.
Survey on Encryption Techniques used to Secure Cloud Storage System
,
2015
.
[4]
Mohamed Mostafa Abdel-Azim,et al.
Counter Chain: A New Block Cipher Mode of Operation
,
2015,
J. Inf. Process. Syst..
[5]
B. B. Zaidan,et al.
New Comparative Study Between DES, 3DES and AES within Nine Factors
,
2010,
ArXiv.
[6]
Morris J. Dworkin,et al.
Recommendation for Block Cipher Modes of Operation: Methods and Techniques
,
2001
.