Enforcing Confidentiality and Authentication over Public Cloud Using Hybrid Cryptosystems

  • N. ThillaiarasuEmail author
  • S. Chenthur Pandian
  • G. Naveen Balaji
  • R. M. Benitha Shierly
  • A. Divya
  • G. Divya Prabha
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


Cloud Computing is that the on-demand delivery of computing power, data storage, applications, and different IT resources through a cloud services platform via Infobahn. The sleek the progress of consumer in easiness, speed, capability, etc., to the work areas from finish to finish their examination. The huge amount of knowledge is handled by the data center provided by cloud. In Cloud computing, the protection choices still stay a massive disadvantage throughout its development. Specializing in security issues, this learning meant toward coming up with some spick-and-span security methodology victimization hybrid cryptosystems. The requirement for this examination is to safeguard data from non-permitted right to use or hackers in cloud at the time of knowledge communication by encrypting the user data. This hybrid cryptosystem is meant and includes of every interchangeable and uneven cryptography rule throughout that blowfish isobilateral rule deals with data confidentiality whereas, RSA uneven rule deals that come with nursing authority. This technique in addition includes the Secured Hash rule-3 for data integrity. This planned methodology provides high security throughout data transmission over the net and licensed network access, server, and storage application.


Blowfish Cloud computing Cryptosystem RSA SHA-3 


  1. 1.
    Timothy, D.P., Santra, A.K.: A hybrid cryptography algorithm for cloud computing security. In: International Conference on Microelectronic Devices, Circuits and systems (ICMDCS). IEEE (2016)Google Scholar
  2. 2.
    Shyamambika, N., Thillaiarasu, N.: A survey on acquiring integrity of shared data with effective user termination in s cloud. In: The Proceedings of International Conference on Intelligent Systems and Control (ISCO16). IEEE (2016).
  3. 3.
    Thillaiarasu, N., Chenthur Pandian, S.: Enforcing security and privacy over multi-loud framework using assessment techniques. In: The Proceedings of International Conference on Intelligent Systems and Control (ISCO16). IEEE (2016).
  4. 4.
    Jain, M., Agrawal, A.: Implementation of hybrid cryptography algorithm. Int. J. Core Eng. Manag. 1(3), 1–8 (2014)Google Scholar
  5. 5.
    Shyamambika, N., Thillaiarasu, N.: Attaining integrity, secured data sharing and removal of misbehaving client in the public cloud using an external agent and secure encryption technique. Adv. Nat. Appl. Sci. 10(9), 421–431 (2016)Google Scholar
  6. 6.
    Somani, U., Lakhani, K., Mundra, M.: Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. In: 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC), 28–30 October. IEEE (2010)Google Scholar
  7. 7.
    Tirthani, N., Ganesan, R.: Data security in cloud architecture based on Diffie Hellman and elliptical curve cryptography. IACR Cryptologye Print archive (2014)Google Scholar
  8. 8.
    Thillaiarasu, N., Chenthur Pandian, S.: A novel schema for safeguarding confidentiality in public clouds for service user of cloud computing. Cluster Comput. J. Netw. Softw. Tool Appl. (2017). ISSN 1386-7857 (print version). ISSN 1573-7543 (electronic version)Google Scholar
  9. 9.
    Aravindhan, K., Evangeline Prasanna, B.: A cluster approach in VANET using collaborative learning automata-based routing. Asian J. Inf. Technol. 15, 4269–4275 (2016)Google Scholar
  10. 10.
    Aravindhan, K., Subhashini, N.: Healthcare monitoring system for elderly person using smart devices. Int. J. Appl. Eng. Res. (IJAER) 10(20) (2015)Google Scholar
  11. 11.
    Subramaniyaswamy, V., Logesh, R., Abejith, M., Umasankar, S., Umamakeswari, A.: Sentiment analysis of tweets for estimating criticality and security of events. J. Organ. End User Comput. (JOEUC) 29(4), 51–71 (2017)CrossRefGoogle Scholar
  12. 12.
    Ranjithkumar, S., Thillaiarasu, N.: A survey of secure routing protocols of mobile adhoc network. SSRG Int. J. Comput. Sci. Eng. (SSRG-IJCSE) 2 (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • N. Thillaiarasu
    • 1
    Email author
  • S. Chenthur Pandian
    • 2
  • G. Naveen Balaji
    • 2
  • R. M. Benitha Shierly
    • 1
  • A. Divya
    • 1
  • G. Divya Prabha
    • 1
  1. 1.SNS College of EngineeringCoimbatoreIndia
  2. 2.SNS College of TechnologyCoimbatoreIndia

Personalised recommendations