Two Pass Multidimensional Key Generation and Encryption Algorithm for Data Storage Security in Cloud Computing
Mohd. Tajammul1, Rafat Parveen2 

1Mohd. Tajammul, Department of Computer Science, Jamia Millia Islamia, New Delhi, India.
2Rafat Parveen, Department of Computer Science, Jamia Millia Islamia, New Delhi, India.

Manuscript received on 17 March 2019 | Revised Manuscript received on 23 March 2019 | Manuscript published on 30 July 2019 | PP: 4152-4158 | Volume-8 Issue-2, July 2019 | Retrieval Number: B3171078219/19©BEIESP | DOI: 10.35940/ijrte.B3171.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Many companies which essentially required cloud computing services are still in ambivalence whether to adopt it or not. In this research paper an attention has been drawn on security of storage as a Service which is an integral part of Infrastructure as a Service which provide famous CSP, AWS. Whenever someone rent the storage from the cloud service provider, chances of its compromising can take place. Therefore it is intelligence to encrypt the data before uploading it to the cloud and more intelligently divide the data into fragments and encrypt these fragments separately and then upload on cloud. Suppose that if this data is divided into n fragments then n algorithm are required to encrypt these fragments or use single one algorithm and change its key n times otherwise if only one key will be used and someone steal this key then all fragments will be decrypted with the same key. Many algorithms like DES, AES, RSA, Elgamal and Blow Fish are there but they all are static in nature and one more weakness of these algorithms is that size of encrypted file increased. While some researchers used these algorithms in combination and some used double encryption, nevertheless nature remains static and decrypted file size increase rapidly. Now, there is a requirement to design a data sensitive algorithm which could sense data and produce different key for different data automatically. In this paper Two Pass Multidimensional Key Generation and Encryption Algorithm has been proposed which will sort the above problem. Another beauty of this algorithm is that it checks the integrity of the documents while decrypting. Out of millions or billions of characters if only one character or word is altered or removed then this algorithm will show that documents integrity has been violated.
Index Terms: Cloud Computing; Two Pass Algorithm; Data Sensitive; Storage Security; User Independent.

Scope of the Article: Cloud Computing