Data migration in cloud computing using honey encryption

  • Authors

    • K Ravindranadh
    • Mallarapu Sai Kiran
    • B Durga Sai Pavan Kumar
    • D Priyanka
    https://doi.org/10.14419/ijet.v7i2.8.10415

    Received date: March 21, 2018

    Accepted date: March 21, 2018

    Published date: March 19, 2018

  • Cloud Computing, Data Migration, Honey Encryption, Data Confidentiality.
  • Abstract

    Cloud computing provides various kinds of services for storing data, load balancing between clouds and provides an infrastructure for developing applications and managing them. Due to various attractive services provided by various  cloud  service  providers,  users migrating  their  data  from  their storage system to  cloud service provider. While migrating data to a  cloud  service  provider  there  will  be  security  and  privacy  protection concerns  arises. By  considering  these  concerns  we  are  proposing  a  secure privacy protection  migration using honey-encryption cryptographic algorithm for data which is outsourced data to cloud and we are using migration protocol while migrating data from existing server storage system to  cloud server  storage system which ensures data integrity and data confidentiality.

  • References

    1. Rashmi rao,” Improving security for data migration in cloud computing using randomized encryption technique”, IOSR Jour-nal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 6 (May. - Jun. 2013), pp 39-42.
    2. Virendra Singh Kushwah,Aradhana Saxena.” A Security ap-proach for Data Migration in Cloud Computing”, Internation-al Journal of Scientific and Research Publications, Volume 3, Is-sue 5, May 2013 1 ISSN 2250-3153.
    3. Weiwang,Ya Zhang,Ben Lin.”Secured and reliable VM migration in personal cloud”, Computer Engineering and Technology (ICCET), 2010 2nd International Conference.
    4. Toqeer alisyed,Shahrulniza Musa,Abdur Rahman .”Towards secure instance migration in cloud”, CloudComputing (ICCC), 2015 International Conference.
    5. Sara saadat,Hamid Reza Shahriari ,”Towards a process-oriented framework for improving trust and security in migration to cloud”, Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference.
    6. Ayad barsowm,AAnwar Hasan ,” Enabling dynamic data and indirect mutual trust for cloud computing storage systems”, IEEE Transactions on Parallel andDistributed Systems ( Vol-ume: 24, Issue: 12, Dec. 2013).
    7. Tayyaba Zeb,Awais Shibli ,Muhammad Yousaf,” A secure archi-tecture for inter cloud vm migration “,10 International ICST con-ference SecureComm 2014, Part I, LNICST 152, pp. 24–35, 2015.
    8. Shaikh rizwana,M Sasi Kumar .” Data classification for achiev-ing security in cloud computing”, Procedia Computer Science Volume 45, 2015, Pages 493-498.
    9. Ankit Dhamija,Vijay Dhaka, “ A novel cryptographic and ste-ganographic approach for secure cloud data migration”, Green Computing and Internet of Things (ICGCIoT), 2015 Internation-al Conference.
    10. Issa Khalil, Ismail Hababeh,Abdallah Khreishah,”Secure inter cloud data migration”Information and Communication Sys-tems (ICICS), 2016 7th International Conference.
    11. Ari juels,”honey encryption beyond brute force barrier”,IEEE Se-curity&privacy (volume:12,issue:4,2014).
    12. Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chow-dary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networks”, 2014 First Interna-tional Conference on Networks & Soft Computing, ISSN:978-1-4799-3486-7/14,pp.270-273,August2014.
    13. Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs” Journal of Engineering and Ap-plied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.
    14. P Bala Gopal, K Hari Kishore, R.R Kalyan Venkatesh, P Har-inath Mandalapu “An FPGA Implementation of On Chip UART Testing with BIST Techniques”, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 14 , pp. 34047-34051, August 2015
    15. A Murali, K Hari Kishore, D Venkat Reddy "Integrating FPGAs with Trigger Circuitry Core System Insertions for Observability in Debugging Process” Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.11, Issue No.12, page: 2643-2650, December 2016.
    16. Mahesh Mudavath, K Hari Kishore, D Venkat Reddy "Design of CMOS RF Front-End of Low Noise Amplifier for LTE System Applications Integrating FPGAs” Asian Journal of Information Technology, ISSN No: 1682-3915, Vol No.15, Issue No.20, page: 4040-4047, December 2016.
    17. N Bala Dastagiri, Kakarla Hari Kishore "Reduction of Kickback Noise in Latched Comparators for Cardiac IMDs” Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Is-sue No.43, Page: 1-6, November 2016.
    18. S Nazeer Hussain, K Hari Kishore "Computational Optimization of Placement and Routing using Genetic Algorithm” Indian Jour-nal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.47, page: 1-4, December 2016.
    19. Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs” Journal of Engineering and Ap-plied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.
    20. N Bala Dastagiri,, K Hari Kishore "Analysis of Low Power Low Kickback Noise in Dynamic Comparators in Pacemakers” Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.44, page: 1-4, November 2016.
    21. Harikishore Kakarla, Madhavi Latha M and Habibulla Khan, “Transition Optimization in Fault Free Memory Application Us-ing Bus-Align Mode”, European Journal of Scientific Research, Vol.112, No.2, pp.237-245, ISSN: 1450-216x135/1450-202x, October 2013.
    22. T. Padmapriya and V. Saminadan, “Improving Throughput for Downlink Multi user MIMO-LTE Advanced Networks using SINR approximation and Hierarchical CSI feedback”, Interna-tional Journal of Mobile Design Network and Innovation- In-derscience Publisher, ISSN : 1744-2850 vol. 6, no.1, pp. 14-23, May 2015.
    23. S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd In-ternational Conference on 26-27Feb.2015, Publisher: IEEE-DOI:10.1109, /ECS.2015.7124833.
  • Downloads

  • How to Cite

    Ravindranadh, K., Sai Kiran, M., Durga Sai Pavan Kumar, B., & Priyanka, D. (2018). Data migration in cloud computing using honey encryption. International Journal of Engineering and Technology, 7(2.8), 230-234. https://doi.org/10.14419/ijet.v7i2.8.10415