Online Data Security for Secure Cloud Storage
N. Indira1, M. Hemalatha2, A.V. Kalpana3, D. Rukmani Devi4, S. Venkatesan5

1N. Indira, Assistant Professor, Department of Computer Science and Engineering, Panimalar Engineering College, Chennai (Tamil Nadu), India. 

2M. Hemalatha, Assistant Professor, Department of Computer Science and Engineering, Aalim Muhammed Salegh College of Engineering, Avadi, Chennai (Tamil Nadu), India. 

3A.V. Kalpana, Assistant Professor, R.M.K Engineering College, Chennai (Tamil Nadu), India. 

4Dr. D. Rukmani Devi, Professor, R.M.D Engineering College, (Tamil Nadu), India. 

5S.Venkatesan, Senior Manager, Tejas Networks Pvt. Ltd. Bangalore (Karnataka), India.

Manuscript received on 22 November 2019 | Revised Manuscript received on 03 December 2019 | Manuscript Published on 14 December 2019 | PP: 99-103 | Volume-9 Issue-1S November 2019 | Retrieval Number: A10231191S19/2019©BEIESP | DOI: 10.35940/ijitee.A1023.1191S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The capacity benefit given by cloud server is not completely trusted by clients. In existing system, data can be modified and corrupted by the unauthorized user with the assistance of the employees. Typically the information are safely taken care of by the organization yet a few employees offered the specifiers to programmers for cash. Because of this issue, the information are not protected. Hence the advanced safe technology is used. The information are uploaded by the encryption design with video mode and the information are downloaded by the client with the assistance of face detection video mode, at that point the administrator acknowledge the solicitation by the face recognition video mode and information are shared starting from one place to another. Utilizing the AES algorithm the information is shared safely. It is implemented in both hardware and software. It utilizes higher length key sizes, for instance, 128, 192 and 256 bits for encryption. It is most basic security convention utilized for wide range of uses, for example, wireless communication, money related exchanges, e-business, encoded information storage and so forth.

Keywords: Face Detection, Downloading File, Encryption, Uploading File, Video Mode.
Scope of the Article: Big Data Security