Design and Analysis of Cloud Data's Multi-Layer Security Protection

Author

Ramesh Byali , Jyothi , Megha Chidambar Shekadar


Abstract

To store and access sensitive information from distant locations utilizing an internet connection, cloud servers are now often employed. By adopting cloud servers as their primary source of data storage, almost all businesses and organizations made the transition from local to distant data storage. It has become a struggle for each and every person to give additional security for the cloud data because, in general, cloud servers do not have total protection for the data that is stored on them. Data is a useful resource that can take many different forms, including payment information, personal information, bank account information, and many others. Due to the absence of data security in all of these forms, we try to useSome cutting-edge encryption methods for protecting the data that is kept in remote locations. Two parties make sure that a third party cannot access their communication when they communicate through a medium. It is better to use encryption methods to encrypt data in a cipher, send it over the internet, and then decrypt it to reveal the original data. By transforming plaintext into cipher text, the science of cryptography encrypts and decrypts data to keep messages private. In this project, we primarily develop 3 techniques, including: The three strategies are columnar transposition, rail fence transposition, and caesar substitution. Data can be protected and returned to its original state using all three processes together.


Keywords

Rescue bag, Rescue techniques, Borewell rescue, Child safety


DOI : https://doi.org/10.55248/gengpi.2022.3.8.5


Full Text:

Download Paper PDF


References


[1] Dr. C.N. Sakhale, D.M. Mate, SubhasisSaha, Tomar Dharmpal, Pranjit Kar, ArindamSarkar, RupamChoudhury, ShahilKumar , “An Approach to Design of Child Saver Machine for Child Trapped in Borehole “, International Journal of Research in Mechanical Engineering, October-December, 2013, pp. 26-38.

 

[2] K. Saran, S. Vignesh, Marlon Jones Louis have discussedaboutthe project is to design and construct a “Bore-well rescue robot” (i.e. torescue a trapped baby frombore well), International Journal of Research in AeronauticalandMechanical Engineering, Boar well rescuerobot , pp. 20-30 April 2014

 

[3] G. Nithin, G. Gowtham, G. Venkatachalamand S. Narayanan, School of Mechanical Building Sciences, VIT University, India, Design andSimulation of Bore well rescue robot– Advanced, ARPN Journal of Engineering andApplied Sciences, pp. MAY 2014.

 

[4] Camera - Direct web search on google.com

 

[5] J. Burke andR.R.Murphy, “Human-robot interaction in USAR technical search: Twoheads are betterthanone,”inProc.IEEE Int. Workshop ROMAN, Kurashiki, Japan, 2004, pp. 307-312.

 

[6] J. Casper and R. R. Murphy, “Human-robot interactionsduringthe robot assistedurban search andrescue response at theworldtrade center,” IEEE Trans. Syst., Man, Cybern. B, Cybern., Vol. 33, no. 3, pp. 367–385, Jun. 2013.

 

[7] R. R. Murphy, “Activities of therescue robots at the World Trade Center from 11–21 September 2001,” in Proc. IEEE Robot. Autom. Mag., 2004, pp. 50–61.

 

[8] Rodriguez, K. M., Reddy, R. S., Barreiros, A. Q., &Zehtab, M. (2012, June). Optimizing Program Operations: Creating a Web-Based Application toAssignand Monitor PatientOutcomes, Educator Productivity and Service Reimbursement. In DIABETES (Vol. 61, pp. A631-A631). 1701 N BEAUREGARD ST, ALEXANDRIA, VA 22311-1717 USA: AMER DIABETES ASSOC.

 

[9] Kwon, D., Reddy, R., & Reis, I. M. (2021). ABCMETAapp: R shinyapplicationforsimulation-basedestimation of meanand standard deviationfor meta-analysis via approximateBayesiancomputation. Research synthesismethods, 12(6), 842–848. https://doi.org/10.1002/jrsm.1505

 

[10] Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R., Singh, P., &Gogineni, A. (2022). Usability Evaluation of anUnpopular Restaurant Recommender Web Application Zomato. Asian Journal of Research in Computer Science, 13(4), 12-33.

 

[11] Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R., Singh, P., &Gogineni, A. (2022). Analysis of theUnexplored Security Issues Common toAll Types of NoSQL Databases. Asian Journal of Research in Computer Science, 14(1), 1-12.

 

[12] Singh, P., Williams, K., Jonnalagadda, R., Gogineni, A., &; Reddy, R. R. (2022). International students: What’s missing andwhatmatters. Open Journal of Social Sciences, 10(02),

 

[13] Jonnalagadda, R., Singh, P., Gogineni, A., Reddy, R. R., & Reddy, H. B. (2022). Developing, implementingandevaluating training for online graduate teaching assistantsbased on Addie Model. Asian Journal of EducationandSocial Studies, 1-10.

 

[14] Sarmiento, J. M., Gogineni, A., Bernstein, J. N., Lee, C., Lineen, E. B., Pust, G. D., &Byers, P. M. (2020).Alcohol/illicitsubstanceuse in fatalmotorcycle crashes. Journal of surgical research, 256, 243-250.

 

[15] Brown, M. E., Rizzuto, T., &Singh, P. (2019). Strategic compatibility, collaborationandcollective impact for community change. Leadership&Organization Development Journal.

 

[16]Sprague-Jones, J., Singh, P., Rousseau, M., Counts, J., &Firman, C. (2020). The Protective Factors Survey: Establishingvalidityandreliability of a self-report measure of protective factors againstchild maltreatment. ChildrenandYouth Services Review, 111, 104868.

 

[17] Reddy Sadashiva Reddy, R., Reis, I. M., & Kwon, D. (2020). ABCMETAapp: R Shiny Application for Simulation-based Estimation of Mean and Standard Deviation for Meta-analysis via Approximate Bayesian Computation (ABC). arXiv e-prints, arXiv-2004.

 

Share your valuable work from Social Media Buttons