Trusted Third Party Framework for Data Security in Cloud Computing Environment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 125 , Downloads: 118 | CTR: 94 % | Weekly Popularity: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

Trusted Third Party Framework for Data Security in Cloud Computing Environment

Ravuri. Venkata Bhargavi, K. Narayana Rao

Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. Some researchers have suggested that user data stored on a service-providers equipment must be encrypted [2]. Encrypting data prior to storage is a common method of data protection, and service providers may be able to build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises the possibility that high-level administrators within the service provider would have access to both the decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we in this paper provides an unique business model of cryptography where crypto keys are distributed across the user and the trusted third party (TTP) with adoption of such a model mainly the CSP insider attack an form of misuse of valuable user data can be treated secured. Thus, the proposed method not only encrypts the sensitive data, but also detects the dishonest party to access the data using combined hash functions.

Keywords: cloud computing, service level agreements, encryption and decryption cloud service, data privacy protection

Edition: Volume 4 Issue 12, December 2015

Pages: 917 - 923

Share this Article

How to Cite this Article?

Ravuri. Venkata Bhargavi, K. Narayana Rao, "Trusted Third Party Framework for Data Security in Cloud Computing Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158848, Volume 4 Issue 12, December 2015, 917 - 923

125 PDF Views | 118 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cloud computing'

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Similar Articles with Keyword 'service level agreements'

Views: 150 , Downloads: 104 | CTR: 69 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Views: 134 , Downloads: 112 | CTR: 84 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1082 - 1086

A Comprehensive Analysis of Existing Load Balancing Algorithms in Cloud Network

Pinki, Nida

Share this Article

Views: 125 , Downloads: 118 | CTR: 94 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 917 - 923

Trusted Third Party Framework for Data Security in Cloud Computing Environment

Ravuri. Venkata Bhargavi, K. Narayana Rao

Share this Article

Views: 142 , Downloads: 122 | CTR: 86 % | Weekly Popularity: ⮙1

Review Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 337 - 341

Review on: Resource Provisioning in Cloud Computing Environment

Sagar Girase, Rahul Samant, Mayank Sohani, Suraj Patil

Share this Article

Similar Articles with Keyword 'data privacy protection'

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Views: 124 , Downloads: 114 | CTR: 92 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1771 - 1776

A Secure Information Hiding Approach in Cloud Using LSB

Mudasir Ahmed Muttoo, Pooja Ahlawat

Share this Article

Views: 135 , Downloads: 117 | CTR: 87 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 626 - 629

A Robust and Flexible Authentication Model with Data Security ? A Review

Nandini Aggarwal, Abhinav Bhandari

Share this Article

Views: 125 , Downloads: 118 | CTR: 94 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 917 - 923

Trusted Third Party Framework for Data Security in Cloud Computing Environment

Ravuri. Venkata Bhargavi, K. Narayana Rao

Share this Article
Top