Secure Data Searching and Sharing Using Third Party in Data Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 119

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Secure Data Searching and Sharing Using Third Party in Data Cloud

Ruturaj Desai, Prof. Nitin R Talhar

Data privacy and security are the most important issues in cloud computing. To achieve higher flexibility and to reduce the cost, many data owners are outsourcing their data management systems to public cloud. Data privacy can be protected by encrypting sensitive data locally before outsourcing. The data encryption prevents the data utilization based on simple search. Thus, enabling an encrypted cloud data search service is very important. Consider, large number of data users and files in cloud, it is important for the search service to allow multi- query and provide results. Retrieving of all files having queried s will not be affordable in pay as per use cloud paradigm. In this paper, we proposed new scheme to solve the problem of multi- search over encrypted data and data sharing using trusted third party in cloud computing. We establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. We are using different cryptographic method like AES, Base64 and BlowFish for file encryption. We are using the effective principle of coordinate matching, i. e. , as many matches as possible, to capture the similarity between search query and the data file. We propose the system using the trusted third party which will allow user to share data stored on cloud without compromising data privacy. Through analysis investigating privacy and efficiency guarantee of proposed scheme is given and experiments further show proposed scheme indeed introduce low overhead on computation and communication.

Keywords: Cloud Computing, Encryption, Multi- search, Coordinate Matching, Trusted Third Party

Edition: Volume 4 Issue 7, July 2015

Pages: 1139 - 1143

Share this Article

How to Cite this Article?

Ruturaj Desai, Prof. Nitin R Talhar, "Secure Data Searching and Sharing Using Third Party in Data Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156506, Volume 4 Issue 7, July 2015, 1139 - 1143

Enter Your Email Address




Similar Articles with Keyword 'Cloud Computing'

Downloads: 180 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 94

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'Multi- search'

Downloads: 118

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1162 - 1165

Survey on Keyword Search in Encrypted Data With Privacy Preservation

Sonal Rahul Jamdade, Jyoti N. Nandimath

Share this Article

Downloads: 118

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2044 - 2048

Multi-keyword Ranked Search Over Encrypted Cloud Data Supporting Synonym Query

Siddheshwar S. Metkari, Dr. S. B. Sonkamble

Share this Article

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1139 - 1143

Secure Data Searching and Sharing Using Third Party in Data Cloud

Ruturaj Desai, Prof. Nitin R Talhar

Share this Article

Downloads: 126

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 457 - 460

Survey on Privacy Preservation for Multi-Keyword Search on Data Network

Nilima S. Kasar, Vitthal S. Phad

Share this Article

Downloads: 127 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1621 - 1624

Achieving Efficient Multi-Keyword Ranked Search over Encrypted Cloud Data Using Bloom Filters

Sana Shaikh, Dr. Rahat Khan

Share this Article

Similar Articles with Keyword 'Coordinate Matching'

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this Article

Downloads: 119 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 781 - 784

Privacy Preserving Multi-Keyword Graded Search on Encrypted Cloud Data with Integrity Checking

Snehal M. Shewale, Prof. Y. B. Gurav

Share this Article

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1139 - 1143

Secure Data Searching and Sharing Using Third Party in Data Cloud

Ruturaj Desai, Prof. Nitin R Talhar

Share this Article

Similar Articles with Keyword 'Trusted Third Party'

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1415 - 1419

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Shivani Bhatia, Rekha Saraswat

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article



Top