International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015


Trusted Third Party Framework for Data Security in Cloud Computing Environment

Ravuri. Venkata Bhargavi | K. Narayana Rao [5]


Abstract: Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. Some researchers have suggested that user data stored on a service-providers equipment must be encrypted [2]. Encrypting data prior to storage is a common method of data protection, and service providers may be able to build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises the possibility that high-level administrators within the service provider would have access to both the decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we in this paper provides an unique business model of cryptography where crypto keys are distributed across the user and the trusted third party (TTP) with adoption of such a model mainly the CSP insider attack an form of misuse of valuable user data can be treated secured. Thus, the proposed method not only encrypts the sensitive data, but also detects the dishonest party to access the data using combined hash functions.


Keywords: cloud computing, service level agreements, encryption and decryption cloud service, data privacy protection


Edition: Volume 4 Issue 12, December 2015,


Pages: 917 - 923


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ravuri. Venkata Bhargavi, K. Narayana Rao, "Trusted Third Party Framework for Data Security in Cloud Computing Environment", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 917-923, https://www.ijsr.net/get_abstract.php?paper_id=SUB158848

Similar Articles with Keyword 'cloud computing'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H [3] | Dr. Mary Cherian

Share this Article
Top