International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-8 Issue-6, August 2019
3235
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number F8831088619/2019©BEIESP
DOI: 10.35940/ijeat.F8831.088619
Abstract: In this paper an efficient secure cloud computing
framework has been developed. This framework consists of data
grouping based on fuzzy c-means (FCM). It has been used for the
individual and associative rankings of uploaded text data on the
cloud. For the decision selection ranking of the data simple
additive weighting (SAW) method have been used. For data
security RC6, RSA and AES algorithms have been used
collectively and individually based on the condition. RC6, AES
and RSA algorithms have been used as a combination for the
complex key security. Based on the decision performance ranking
top higher rank which supports are >=50% adopted all the three
security algorithms, only one key is applied for the remaining
data. The maximum number of keys applied is 5 but there are total
three key variants mainly applicable. So we have considered three
keys. It has been clear from our results that the keys spreading are
automatically increased on the basis of number of files. So in case
of high risk the keys are increased automatically and applied.
Keywords: FCM, RC6, AES, RSA.
I. INTRODUCTION
In today’s era the services which have been accessible
easily by cloud computing on demand with the ease of
applicability and reduced cost [1−3]. It has been fulfilled
based on the resource requirement and the systems conditions
and applicability [4, 5]. The ease of applicability and business
performances makes this platform very suitable in current era
[6−10].
There are several protocols and applications which have
been used widely with these applications. These protocols
can be helpful in different communication scenario with the
help of data aggregation and specialization. Figure 1 shows
the cloud computing resources. The main motivation of our
paper is to provide an efficient security protocol for the cloud
user authentication and data aggregation at the time of data
communication. The communication scenario is mainly
affected by the security threats in the cloud computing
environment.
The paper objectives are as follows:
1. To provide data categorization for the purpose of data
separation and aggregation in cloud computing environment
for the purpose of secure communication.
2. To apply decision making process for the security
requirement checking in the way that it can be cope the
security needs.
3. To apply the separations of the security needs for the
concurrent crypto system application and adaptions.
4. To apply data key hybridization for the requirement of
Revised Manuscript Received on August 25, 2019.
* Correspondence Author
Dheresh Soni*, Research Scholar, Mewar University, Chittorgarh,
Rajasthan.
M. Kumar, Retired Professor, MANIT, Bhopal, India.
complex security system for the cloud data also.
Figure 1 cloud computing resources
II. RELATED WORK
In 2018, Surbiryala and Rong [11] discussed the
involvement of cloud computing in case of individuals and
organizations. They have suggested that the important factors
for using the cloud computing platform are low costs,
computational power, and storage services over the Internet.
They have suggested the main specialty is the data recovery,
according to the authors it is the backbone. They have
suggested that the confidential data can be recovered even if
the data is deleted. They have discussed the security concerns
based on the tools used for recovery in the cloud computing
environment. They have proposed a rename method.
In 2018, Bharadwaj et al. [12] discussed the operation
ability of the cloud computing environment. They have
suggested that like other technology there are also several
security risks in cloud computing. They have explored
security related issue in cloud computing. They have
investigated in the direction of dynamic cloud environment
and provides different solutions for the real time challenges.
In 2018, Chandel et al. [13] discussed the enterprise cloud
technology and data storage services. They have suggested
that due to the security issue several companies do not trust
for their sensitive data. They have discussed on the
exponential growth of the cloudbased services in China
focusing the security concern and applicability. They have
also discussed the risk and challenges.
In 2019, Koo et al. [14] discussed security issue in cloud
computing. They have suggested that the current security
system is not sufficient for the national defense information
system. They have suggested the need of security architecture
based on cloud computing for
the national defense command
control system. They have
also analyzed the U.S. military
Cloud
Resouces
Data
managem
ent
Adaptati
on
Resource
sharing
Query
Data
Aggregatio
n
An automated cloud security framework based
on FCM in user-cloud environment
Dheresh Soni, M. Kumar