Multiple key Generation for Securing Data Sharing and Backup
Hariharan. R1, Jayashree. D2, Vishal Chauhan3, Vibek Jyoti Roy4, Anandhi K5

1Hariharan.R, Department of Information Technology ,Veltech Rangarajan Dr. Sagunthala R&D institute of science and technology, Chennai, India.
2Jayashree.D, Department of Information Technology ,Veltech Rangarajan Dr. Sagunthala R&D institute of science and technology, Chennai, India.
3Vishal Chauhan , Department of Information Technology ,Veltech Rangarajan Dr.Sagunthala R&D institute of science and technology, Chennai, India.
4Vibek Jyoti Roy, Department of Information Technology , Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology, Avadi ,Chennai, India. 5Anandhi K, Department of CSE, Vel Tech High Tech Rangarajan Dr Sakunthala Engineering College, Avadi ,Chennai, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 166-169 | Volume-8 Issue-6, August 2019. | Retrieval Number: E6926068519/2019©BEIESP | DOI: 10.35940/ijeat.E6926.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Currently a data sharing and data backup is been maintained by the intermediator of cloud admin provider also to reduce the cost of intermediator management and to get an authentication. It is introducing to provide a security and efficient access to large amount of outsourced data. In this project we are proposing a key distribution to solve the problem (encryption and decryption). As the user is provided two types of key by the admin to secure the data outsourcing and data backup which is been encrypted and decrypted so that threading and attacks can be reduced using cryptography based key mechanism. We are introducing a key mechanism using RSA and AES for generating keys files to secure the data. By this cryptographic key mechanism, the cloud users are free from the data management, consumption of time, cost.
Keywords: Data security, RSA (key mechanism), AES (encryption, decryption), cloud computing.