Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Issue 2012 by IJCTT Journal|
|Volume-3 Issue-4 |
|Year of Publication : 2012|
|Authors :G.Devi, M.Pramod Kumar|
G.Devi, M.Pramod Kumar"Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm "International Journal of Computer Trends and Technology (IJCTT),V3(4):1011-1016 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -Cloud computing is a distributive computation task on the resource pool which consists of massive computers. LMS experiences with Cloud and Managed Cloud Service provider are due to numerous factors. Availability means that the services are available even when quite a number of nodes fail.Cloud services are provided by many IT companies like Google, Amazon, Microsoft, and Salesforce.com. An enterprise usually store data in local storage and then tries to protect the information from other external source. They also provide authentication at certain fixed level. To overcome this limitation, we are presenting some approaches that do not require full dependency on the external security provider. Storing the data in encrypted form is a common method of data privacy security. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously hold encrypted data and decryption keys. This allows them to access information without authorization and thus poses a threat to information privacy. A LMS (Learning Management System) service is described in this project using Blowfish algorithm. It promotes more accessibility to LMS service providers to send their training modules and syllabus via Internet at any point of the hour much more efficiently. This gives rise to reduced cost of hardware and software tools, which in return would scale-up the e-learning environment. In the existing system RSA algorithm used. It requires more computation time for large volumes of data. To reduce this computation time we are using Blowfish algorithm. The LMS Service utilizes three cloud systems, including an encryption and decryption system, a storage system, and LMS application system.
 Mehrdad Mahdavi Boroujerdi, Soheil Nazem, Cloud Computing: Changing Cogitation about Computing, World Academy of Science, Engineering and Technology 58 2009.
 Amazon web service, [Online]. Available: http://aws.amazon.com/
 Top Threats to Cloud Computing V1.0, Cloud Security Alliance, March 2010.
 L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
 C. Weinhardt, A. Anandasivam, B. Blau, N. Borissov, T. Meinl, W. Michalk, and J. Stößer, “Cloud computing – a classification, business models, and research directions,” Business & Information Systems Engineering (BISE), vol. 1, no. 5, pp. 391-399, 2009.
 N. Hawthorn, “Finding security in the cloud,” Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
 A. Parakh and S. Kak, “Online data storage using implicit security”, Information Sciences, vol. 179, issue 19, pp. 3323-3333 ,September 2009
KeywordsWireless Sensor Network (WSN); Speech-recognition, Power-Point; ARM7 based LPC2148 MC