Design and Analysis of Cloud Data's Multi-Layer Security Protection
Author
Ramesh Byali , Jyothi , Megha Chidambar Shekadar
Abstract
To
store and access sensitive information from distant locations utilizing an
internet connection, cloud servers are now often employed. By adopting cloud
servers as their primary source of data storage, almost all businesses and
organizations made the transition from local to distant data storage. It has
become a struggle for each and every person to give additional security for the
cloud data because, in general, cloud servers do not have total protection for
the data that is stored on them. Data is a useful resource that can take many
different forms, including payment information, personal information, bank
account information, and many others. Due to the absence of data security in
all of these forms, we try to useSome cutting-edge encryption methods for
protecting the data that is kept in remote locations. Two parties make sure
that a third party cannot access their communication when they communicate
through a medium. It is better to use encryption methods to encrypt data in a
cipher, send it over the internet, and then decrypt it to reveal the original
data. By transforming plaintext into cipher text, the science of cryptography
encrypts and decrypts data to keep messages private. In this project, we
primarily develop 3 techniques, including: The three strategies are columnar
transposition, rail fence transposition, and caesar substitution. Data can be
protected and returned to its original state using all three processes
together.
Keywords
Rescue bag, Rescue techniques, Borewell rescue, Child safety
DOI : https://doi.org/10.55248/gengpi.2022.3.8.5
Full Text:
Download Paper PDF
References
[1] Dr. C.N. Sakhale, D.M. Mate, SubhasisSaha, Tomar
Dharmpal, Pranjit Kar, ArindamSarkar, RupamChoudhury, ShahilKumar , “An
Approach to Design of Child Saver Machine for Child Trapped in Borehole “,
International Journal of Research in Mechanical Engineering, October-December,
2013, pp. 26-38.
[2] K. Saran, S. Vignesh, Marlon Jones Louis have
discussedaboutthe project is to design and construct a “Bore-well rescue robot”
(i.e. torescue a trapped baby frombore well), International Journal of Research
in AeronauticalandMechanical Engineering, Boar well rescuerobot , pp. 20-30
April 2014
[3] G. Nithin, G. Gowtham, G. Venkatachalamand S.
Narayanan, School of Mechanical Building Sciences, VIT University, India,
Design andSimulation of Bore well rescue robot– Advanced, ARPN Journal of
Engineering andApplied Sciences, pp. MAY 2014.
[4] Camera - Direct web search on google.com
[5] J. Burke andR.R.Murphy, “Human-robot interaction in
USAR technical search: Twoheads are betterthanone,”inProc.IEEE Int. Workshop ROMAN,
Kurashiki, Japan, 2004, pp. 307-312.
[6] J. Casper and R. R. Murphy, “Human-robot
interactionsduringthe robot assistedurban search andrescue response at
theworldtrade center,” IEEE Trans. Syst., Man, Cybern. B, Cybern., Vol. 33, no.
3, pp. 367–385, Jun. 2013.
[7] R. R. Murphy, “Activities of therescue robots at the
World Trade Center from 11–21 September 2001,” in Proc. IEEE Robot. Autom.
Mag., 2004, pp. 50–61.
[8] Rodriguez, K. M., Reddy, R. S., Barreiros, A. Q.,
&Zehtab, M. (2012, June). Optimizing Program Operations: Creating a
Web-Based Application toAssignand Monitor PatientOutcomes, Educator
Productivity and Service Reimbursement. In DIABETES (Vol. 61, pp. A631-A631).
1701 N BEAUREGARD ST, ALEXANDRIA, VA 22311-1717 USA: AMER DIABETES ASSOC.
[9] Kwon, D., Reddy, R., & Reis, I. M. (2021).
ABCMETAapp: R shinyapplicationforsimulation-basedestimation of meanand standard
deviationfor meta-analysis via approximateBayesiancomputation. Research
synthesismethods, 12(6), 842–848. https://doi.org/10.1002/jrsm.1505
[10] Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R.,
Singh, P., &Gogineni, A. (2022). Usability Evaluation of anUnpopular
Restaurant Recommender Web Application Zomato. Asian Journal of Research in
Computer Science, 13(4), 12-33.
[11] Reddy, H. B. S., Reddy, R. R. S., Jonnalagadda, R.,
Singh, P., &Gogineni, A. (2022). Analysis of theUnexplored Security Issues
Common toAll Types of NoSQL Databases. Asian Journal of Research in Computer
Science, 14(1), 1-12.
[12] Singh, P., Williams, K., Jonnalagadda, R., Gogineni,
A., &; Reddy, R. R. (2022). International students: What’s missing
andwhatmatters. Open Journal of Social Sciences, 10(02),
[13] Jonnalagadda, R., Singh, P., Gogineni, A., Reddy, R.
R., & Reddy, H. B. (2022). Developing, implementingandevaluating training
for online graduate teaching assistantsbased on Addie Model. Asian Journal of
EducationandSocial Studies, 1-10.
[14] Sarmiento, J. M., Gogineni, A., Bernstein, J. N.,
Lee, C., Lineen, E. B., Pust, G. D., &Byers, P. M.
(2020).Alcohol/illicitsubstanceuse in fatalmotorcycle crashes. Journal of
surgical research, 256, 243-250.
[15] Brown, M. E., Rizzuto, T., &Singh, P. (2019).
Strategic compatibility, collaborationandcollective impact for community
change. Leadership&Organization Development Journal.
[16]Sprague-Jones, J., Singh, P., Rousseau, M., Counts,
J., &Firman, C. (2020). The Protective Factors Survey:
Establishingvalidityandreliability of a self-report measure of protective factors
againstchild maltreatment. ChildrenandYouth Services Review, 111, 104868.
[17] Reddy Sadashiva Reddy, R., Reis,
I. M., & Kwon, D. (2020). ABCMETAapp:
R Shiny Application for Simulation-based Estimation of Mean and Standard
Deviation for Meta-analysis via Approximate Bayesian Computation (ABC). arXiv
e-prints, arXiv-2004.
Share your valuable work from Social Media Buttons