To Apply the SRow Operations for Improve the Security of Cloud-Based Data

MSRDG International Journal of Computer Scientific Technology & Electronics Engineering

 

© 2025 by MSRDG IJCSTEE Journal

Volume 1 Issue 4

Year of Publication: 2025



Authors: K. Karthik, Prabhu Rengaramanujam, A. Manikandan
Paper


Download


Article ID
MSRDG-IJCSTEE-V1I4P102
Abstract:

The Internet of Things (IoT) shows a new way to create heterogeneous and distributed systems that can be used as a platform for ubiquitous computing services. Because the Internet of Things (IoT) creates so much data that there aren't enough processing and storage resources to handle it all, a cloud-based architecture is being employed a lot to meet these needs. As a result, the cloud-based Internet of Things ecosystem has had a lot of serious security and trust problems. To address these challenges, a new strategy called SRow operations has been put forward. The approach has four different parts. 1. Choose the Secret Message— Pick a message that you want to keep private. 2. To apply the ASCII code for secret message. 3. To swap the cell values in the matrix using encrpted secret message. 4. you will exchange the row operations in the matrix. Plain text is changed into encrypted text to protect the information. To decrypt something, you have to undo the conversion, which gives you the message in its original form. The suggested solution is safer than other common ways of encrypting data.

Keywords: ChaCha, Decryption, Encryption, Performance, SRow