International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud

Kirti Panmand, Sandeep Kadam

Cloud computing is developing and deliberated next generation architecture for computing. Cloud computing is a combination of computing resources accessible via internet. Historically the client or organizations store data in data centers with firewall and other security methods used to defend data against intrudes to access the data. Since the data was confined to data centers in limits of organization, the control over the data was more and well defined measures could be taken for retrieving its own data. On the other hand in cloud computing, the data is warehoused anywhere across the globe, the client organization has minimum control over the stored data. To form the conviction for the development of cloud computing the cloud providers must defend the user data from unauthorized access and disclosure. Encryption technique could be used on the data on client side before storing it in cloud storage, but this technique has too much affliction from client side in terms of key management, maintenance etc. Divide and rule can be other techniques, it means distributing the task among various cloud services providers can profit the client. A TPA (Third Party Auditor) is used to provide security services, while the other cloud provider would be data storage provider. TPA would not store any data at its end, and its only concerned for providing security service. The application will provide data integrity verification by using hashing algorithm like SHA-1, encryption/decryption will be done by using MD5 algorithm, and defining group of people who can access the shared data can be reached by describing access list. The application is liable for encryption/decryption, computing the hash data and does not store any data in TPA system. The encrypted data and original data hash are stored in Separate Cloud. Therefore even if the cloud system administrator has access user data, the data is in encrypted form, hence it will be tough for the system administrator to recognize the encrypted data. When the user downloads the data from Storage Cloud, it is decrypted first and then new hash is calculated which is then equated with hash of original data stored in Security Cloud. This application provides the user with the ability to store the encrypted data in the cloud and hash and encryption/decryption keys in security cloud service, and no single cloud service provider has access to both. Further benefit of assigning responsibility to TPA is that it aids the client from any kind of key management or maintenance of any important information related to data, because of which it allows the client to use any browser enabled devices to access such service.

Keywords: Cloud computing, encryption and decryption service, data protection and integrity

Edition: Volume 4 Issue 6, June 2015

Pages: 2885 - 2889

Share this Article

How to Cite this Article?

Kirti Panmand, Sandeep Kadam, "An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156030, Volume 4 Issue 6, June 2015, 2885 - 2889

31 PDF Views | 31 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'Cloud computing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1678 - 1681

Integrity Attestation and Auto-correction of Services for SaaS Clouds

Amulya Rachna, John Prakash Veigas

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1450 - 1453

Multi-Cloud Data Storing Strategy with Cost Efficiency and High Availability

Shilpa B Kodli, Pramila D Reshmi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3092 - 3094

Performance Monitoring and Improvement by VMM in Cloud System

Shafali Gupta, Payal Kulkarni

Share this Article



Top