Encoded Data Methodologies for Cloud Computing Realm’s Security Enhancement
Ashutosh Shankhdhar1, Arushi Mangla2, Prateeksha Chaturvedi3
1Ashutosh Shankhdhar, Computer Science and Applications, GLA University, Mathura, India.
2Arushi Mangla, Computer Science and Applications, GLA University, Mathura, India.
3Prateeksha Chaturvedi, Computer Science and Applications, GLA University, Mathura, India.

Manuscript received on 07 April 2019 | Revised Manuscript received on 14 May 2019 | Manuscript published on 30 May 2019 | PP: 1461-1466 | Volume-8 Issue-1, May 2019 | Retrieval Number: A9260058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud Computing has emerged as one of the finest growing technology in today’s era with the help of its fundamental services which help in making the capabilities of IT Technology reusable and this is what makes it unique and so popular among the IT enthusiasts. Although along with services being provided, security is also what a user requires to ensure the viability of a system. This paper proposes a feasible mechanism for reliable delivery of services and information and validation of applications of cloud among the data possessor, cloud executive and a client via trusted methodologies. Maintaining confidentiality of the data and secure information is the ultimate aim and focus has also been given on trusted access to the secure data. The objective has been tried to be achieved by devising an algorithm which ensures complete security and reliability of a user’s data and information by keeping it secured in a folder, which will then be encoded by the user itself and the key to decode the specific folder will only be with the authorized person. Separate work has been done on the ways by which data will be stored at the Cloud Executive’s side, after which the required queries will be implemented to encode the data and then how the authorized resource will be able to decode the folder. This ensures complete reliability of the data at the Cloud Executive’s side and also can prove to be very efficient and easy for a user to do so. The proposed mechanism will not only help the users and clients to maintain confidentiality and integrity of their data but also the level of security which may already be provided will also be enhanced and the cloud realm will become more viable for the data possessors too. A secure system will be ensured in the end and that is the end goal today for any person who requests and uses services of the web.
Index Terms: Data Possessor, Cloud Executive, Query Encoding, Folder Decoding.

Scope of the Article: Cloud Computing