Research Article | Open Access | Download PDF
Volume 3 | Issue 4 | Year 2012 | Article Id. IJCTT-V3I4P114 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I4P114
Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm
G.Devi, M.Pramod Kumar
Citation :
G.Devi, M.Pramod Kumar, "Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 4, pp. 592-596, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I4P114
Abstract
Cloud computing is a distributive computation task on the resource pool which consists of massive computers. LMS experiences with Cloud and Managed Cloud Service provider are due to numerous factors. Availability means that the services are available even when quite a number of nodes fail.Cloud services are provided by many IT companies like Google, Amazon, Microsoft, and Salesforce.com. An enterprise usually store data in local storage and then tries to protect the information from other external source. They also provide authentication at certain fixed level. To overcome this limitation, we are presenting some approaches that do not require full dependency on the external security provider. Storing the data in encrypted form is a common method of data privacy security. If a cloud system is responsible for both tasks on storage and encryption/decryption of data, the system administrators may simultaneously hold encrypted data and decryption keys. This allows them to access information without authorization and thus poses a threat to information privacy[1]. A LMS (Learning Management System) service is described in this project using Blowfish algorithm. It promotes more accessibility to LMS service providers to send their training modules and syllabus via Internet at any point of the hour much more efficiently. This gives rise to reduced cost of hardware and software tools, which in return would scale-up the e-learning environment. In the existing system RSA algorithm used. It requires more computation time for large volumes of data. To reduce this computation time we are using Blowfish algorithm. The LMS Service utilizes three cloud systems, including an encryption and decryption system, a storage system, and LMS application system.
Keywords
Wireless Sensor Network (WSN); Speech-recognition, Power-Point; ARM7 based LPC2148 MC
References
[1]A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service. http://www.techrepublic.com/whitepapers/a-business-modelfor-cloud-computing-based-on-a-separate-encryption-and decryption-service/3500091
[2] David S. Linthicum, Cloud Computing and SOA Convergence in your Enterprise, Pearson, 2010.
[3] R. Buyya, C. S. Yeo, and S. Venugopa, “Marketoriented Cloud Computing: Vision, hype, and reality for delivering it services as computing utilities”, in Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC-08, IEEE CS Press, Los Alamitos,CA, USA) 2008.
[4] Mehrdad Mahdavi Boroujerdi, Soheil Nazem, Cloud Computing: Changing Cogitation about Computing, World Academy of Science, Engineering and Technology 58 2009.
[5] Amazon web service, [Online]. Available: http://aws.amazon.com/
[6] Top Threats to Cloud Computing V1.0, Cloud Security Alliance, March 2010.
[7] L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
[8] C. Weinhardt, A. Anandasivam, B. Blau, N. Borissov, T. Meinl, W. Michalk, and J. Stößer, “Cloud computing – a classification, business models, and research directions,” Business & Information Systems Engineering (BISE), vol. 1, no. 5, pp. 391-399, 2009.
[9] N. Hawthorn, “Finding security in the cloud,” Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
[10] A. Parakh and S. Kak, “Online data storage using implicit security”, Information Sciences, vol. 179, issue 19, pp. 3323-3333 ,September 2009.