Secure Data in Cloud Computing Using Encryption Algorithms

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2015 by IJPTT Journal
Volume - 5 Issue - 3
Year of Publication : 2015
Authors : Laxmikant S. Bhattad , Prof.P. P. Deshmukh


Laxmikant S. Bhattad , Prof.P. P. Deshmukh "Secure Data in cloud computing using encryption algorithms". International Journal of P2P Network Trends and Technology (IJPTT), V5(3):1-4 May - Jun 2015, ISSN:2249-2615,, Published by Seventh Sense Research Group.


Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. In order to address this problem, we proposed an efficient data security method using cryptographic techniques. Thus, the proposed method not only encrypts the sensitive data, but also detects the dishonest party to access the data using combined hash functions. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. We have analyzed the proposed method in terms of storage, communication and computational overheads. The result shows that the proposed security method is more efficient than the existing security system.


[1] Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and Jingbo Yan Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013.
[2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, ―A View of Cloud Computing, Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
[3] S. Kumaraand K.Later, ―Cryptographic Cloud Storage, Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136- 149, Jan. 2010.
[4] Prakash G L, Dr. Manish Prateek, and Dr. Inder Singh, ―Data Security Algorithms for Cloud Storage System using Cryptographic Method, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March -2014.
[5] S. Yu, C. Wang, K.Ran, and W. Lou, ―Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing, ―Prow. IEEE INFOCOM, pp. 534-542, 2010.
[6] Rich Marginal, solaria communication. ―Cloud computing is changing how we communicate.
[7] Randolph Barr, Quay’s Inc., ―How to gain comfort in losing control to the cloud.
[8] Greg Boss, Padma Malady, Dennis Quinn, Linda Ledgering, Harold Hall, HI PODS, developer works/web sphere/zones/hippos.
[9] Thrum Dillon, Chen Wu, Elizabeth Chang, 2010 24th IEEE International Conference on Advanced Information Networking and Applications,―Cloud computing: issues and challenges.
[10] Schadt, E. E., Linderman, M. D., Sorenson, J., Lee, L., and Nolan, G. P. Computational solutions to large-scale data management and analysis, Nature Reviews Genetics, Vol. 11, 647–657. doi:10.1038/nrg2857
[11] Schaffer, H. X as a service, cloud computing, and the need for good judgment. IT Professional, Vol. 11, 5 (2009).
[12] B. Liu, Y. Chen, A. Hades, Department of Electrical and Computer Engineering, Binghamton University, SUNY, Binghamton
[13] Book written by William stalling, AES, Chapter 5, Chapter4, in cryptography and network security.

Cloud Computing, Data Control, Data Sharing, Privacy Preserving, Verification, Access Control, Encryption, Decryption, Data Storage and Data Privacy.