An approach for Privacy Preserving of Encrypted Outsourced Data using Secret Key Distribution on Cloud

Authors

  • Pooja Arudkar  Department of Computer Science & Engineering, G.H. Raisoni Academy of Engg & Technology, Nagpur, Maharashtra, India
  • Prof. Vikrant Chole  Department of Computer Science & Engineering, G.H. Raisoni Academy of Engg & Technology, Nagpur, Maharashtra, India

Keywords:

Cloud Computing, Threshold Cryptography, Access Control, Authentication, Outsourced Data.

Abstract

Cloud computing has grow to be a trend with the supply of innumerable benefits. Cloud has end up an emerging well known that brings approximately diverse technology and computing thoughts for internet at very low fee. Huge storage centres are provided by the cloud which can be accessed without difficulty from any corner of the sector and at any time but there are sure problems and demanding situations confronted via the user whilst the use of cloud computing with regard to protection. But new demanding situations popped out to ensure Confidentiality, integrity and access manage of the information. To cope with those issues we will be predisposed to advise a subject matter that uses threshold cryptography inside which records proprietor divides customers in businesses and offers single key to every group in the mean time, that single key (separate via method that will become special mystery key) is distribute to every consumer of that cluster for decoding of records. The most feature of this subject is that cut again the number of safety key and it additionally make certain that entirely attested users can get entry to the outsourced know-how.

References

  1. Sushil Kr Saroj, Sanjeev Kr Chauhan, Aravendra Kr Sharma, Sundaram Vats, “Threshold Cryptography Based Data Security in Cloud Computing”, IEEE International Conference on Computational Intelligence & Communication Technology, 2015.
  2. Apurva Gomase, Prof. Vikrant Chole, ”Secure system implementation using attribute based encryption”, IJATES,Vol.No.03,Special issue No.01,Nov 2015.
  3. S. Sanka, C. Hota, and M. Rajarajan, “Secure data access in cloud computing," Internet Multimedia Services Architecture and application (IMSAA), 2010 IEEE 4th International Conference on, vol., no., pp.1-6,15-17 Dec. 2010.
  4. Gauravweni Hedau , Prof. Vikrant Chole , “Implementation of Efficient Approach towards Classification of Semantically Secure Encrypted Data” International Journal of Scholarly Research (IJSR) Vol-1, Issue-2, 2017
  5. Sarita Kumari, “A research Paper on Cryptography Encryption and Compression Techniques”, International Journal Of Engineering And Computer Science, Volume 6 Issue 4 April 2017.
  6. Sultan Aldossary, William Allen “Data Security, Privacy, Availability and Integrity inCloud Computing: Issues and Current Solutions”, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 7, No. 4, 2016.
  7. YatendraSahu, NehaAgrawal, “Scheduling Resources in Cloud using Threshold Values at Host and Data Center level” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (6) , 2015.
  8. Z. Zhou and D. Huang, “Ef?cient and secure data storage operations for mobile cloud computing”, in Proceedings of the 8th International Conference on Network and Service Management. International Federationfor Information Processing, 2012, pp. 37–45.
  9. Parikshit N. Mahalle, NeeliRashmi Prasad and Ramjee Prasad, Fellow, IEEE, “Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)”, Wireless Communications, Vehicular Technology, Information Theory and Aerospace &Electronics Systems (VITAE), 2014 4th International Conference on11-14 May 2014.
  10. Carlos Mendes, João Ferreira, Miguel Mira da Silva,“Identifying Services from a Service Provider and Customer Perspectives”,International Joint Conference on Knowledge Discovery, Knowledge Engineering, and Knowledge ManagementIC3K 2011.
  11. Yunchuan Sun, Junsheng Zhang, YongpingXiong, and Guangyu Zhu, “Data Security and Privacy in Cloud Computing”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, Volume2014.
  12. Swapna Lia Anil, Roshni Thanka, “ A Survey on Security of Data outsourcing in Cloud”, International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013

Downloads

Published

2018-03-30

Issue

Section

Research Articles

How to Cite

[1]
Pooja Arudkar, Prof. Vikrant Chole, " An approach for Privacy Preserving of Encrypted Outsourced Data using Secret Key Distribution on Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 7, pp.52-57, March-April-2018.