Data migration in cloud computing using honey encryption

  • Authors

    • K Ravindranadh
    • Mallarapu Sai Kiran
    • B Durga Sai Pavan Kumar
    • D Priyanka
    2018-03-19
    https://doi.org/10.14419/ijet.v7i2.8.10415
  • Cloud Computing, Data Migration, Honey Encryption, Data Confidentiality.
  • Cloudcomputing provides variouskindsof servicesfor storingdata, load balancing betweencloudsandprovides an infrastructure for developing applicationsandmanaging them.Duetovariousattractive services provided by various cloudservice providers, users migrating their data from  their storage systemtocloudserviceprovider.Whilemigratingdatatoa cloudservice provider there will be  security  and privacy  protection concerns arises.Byconsideringthese concerns we are  proposing a secure privacy protection  migration usinghoney-encryptioncryptographicalgorithmfordata whichis outsourceddatatocloudandweareusingmigrationprotocolwhile migratingdatafromexisting serverstoragesystemtocloud server  storage systemwhichensures dataintegrityand data confidentiality.

  • References

    1. [1] Rashmi rao,†Improvingsecurityfordatamigrationincloudcomputingusing randomizedencryption techniqueâ€, IOSR Journal of ComputerEngineering(IOSR-JCE)e-ISSN:2278-0661,p-ISSN:2278-8727Volume 11,Issue 6 (May. - Jun.2013),pp39-42.

      [2] Virendra SinghKushwah,Aradhana Saxena.†ASecurityapproachforDataMigrationinCloudComputingâ€,InternationalJournal ofScientificand Research Publications, Volume 3, Issue5,May 20131 ISSN2250-3153.

      [3] Weiwang,YaZhang,BenLin.â€Securedand reliable VM migration in personal cloudâ€, ComputerEngineeringandTechnology(ICCET),20102nd InternationalConference.

      [4] Toqeeralisyed,ShahrulnizaMusa,Abdur Rahman .â€Towards secure instance migration in cloudâ€, CloudComputing(ICCC),2015InternationalConference.

      [5] Sarasaadat,Hamid Reza Shahriari ,â€Towardsaprocess-orientedframeworkforimprovingtrustandsecurity inmigrationtocloudâ€,InformationSecurity andCryptology (ISCISC), 201411th InternationalISCConference.

      [6] Ayad barsowm,AAnwar Hasan ,†Enablingdynamicdataandindirectmutualtrustforcloudcomputing storage systemsâ€, IEEE Transactions on Parallel andDistributedSystems( Volume:24, Issue:12, Dec. 2013).

      [7] Tayyaba Zeb,AwaisShibli ,Muhammad Yousaf,†A secure architecture for inter cloud vm migration “,10 International ICST conferenceSecureComm2014,PartI,LNICST152,pp.24–35,2015.

      [8] Shaikh rizwana,MSasi Kumar .†Dataclassificationforachievingsecurityincloudcomputingâ€, Procedia Computer ScienceVolume 45, 2015,Pages493-498.

      [9] Ankit Dhamija,Vijay Dhaka, “ A novel cryptographic and steganographic approach for secure cloud data migrationâ€, Green Computing and Internet of Things (ICGCIoT), 2015 International Conference.

      [10] Issa Khalil, IsmailHababeh,AbdallahKhreishah,â€Secure inter cloud data migrationâ€Informationand CommunicationSystems(ICICS),20167thInternationalConference.

      [11] Ari juels,â€honey encryption beyond brute force barrierâ€,IEEESecurity&privacy(volume:12,issue:4,2014).

      [12] Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networksâ€, 2014 First International Conference on Networks & Soft Computing, ISSN:978-1-4799-3486-7/14,pp.270-273,August2014.

      [13] Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.

      [14] P Bala Gopal, K Hari Kishore, R.R Kalyan Venkatesh, P Harinath Mandalapu“An FPGA Implementation of On Chip UART Testing with BIST Techniquesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 14 , pp. 34047-34051, August 2015

      [15] A Murali, K Hari Kishore, D Venkat Reddy "Integrating FPGAs with Trigger Circuitry Core System Insertions for Observability in Debugging Process†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.11, Issue No.12, page: 2643-2650, December 2016.

      [16] Mahesh Mudavath, K Hari Kishore, D Venkat Reddy "Design of CMOS RF Front-End of Low Noise Amplifier for LTE System Applications Integrating FPGAs†Asian Journal of Information Technology, ISSN No: 1682-3915, Vol No.15, Issue No.20, page: 4040-4047, December 2016.

      [17] N Bala Dastagiri, Kakarla Hari Kishore "Reduction of Kickback Noise in Latched Comparators for Cardiac IMDs†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.43, Page: 1-6, November 2016.

      [18] S Nazeer Hussain, K Hari Kishore "Computational Optimization of Placement and Routing using Genetic Algorithm†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.47, page: 1-4, December 2016.

      [19] Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.

      [20] N Bala Dastagiri,, K Hari Kishore "Analysis of Low Power Low Kickback Noise in Dynamic Comparators in Pacemakers†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.44, page: 1-4, November 2016.

      [21] Harikishore Kakarla, Madhavi Latha M and Habibulla Khan, “Transition Optimization in Fault Free Memory Application Using Bus-Align Modeâ€, European Journal of Scientific Research, Vol.112, No.2, pp.237-245, ISSN: 1450-216x135/1450-202x, October 2013.

      [22] T. Padmapriya and V. Saminadan, “Improving Throughput for Downlink Multi user MIMO-LTE Advanced Networks using SINR approximation and Hierarchical CSI feedbackâ€, International Journal of Mobile Design Network and Innovation- Inderscience Publisher, ISSN : 1744-2850 vol. 6, no.1, pp. 14-23, May 2015.

      [23] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27Feb.2015, Publisher: IEEEDOI:10.1109, /ECS.2015.7124833.

  • Downloads

  • How to Cite

    Ravindranadh, K., Sai Kiran, M., Durga Sai Pavan Kumar, B., & Priyanka, D. (2018). Data migration in cloud computing using honey encryption. International Journal of Engineering & Technology, 7(2.8), 230-234. https://doi.org/10.14419/ijet.v7i2.8.10415