Data Seclusion in Multi-Owner Model using Dual-Encryption Method in Cloud Computing

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-36 Number-2
Year of Publication : 2016
Authors : M. Anusha
DOI :  10.14445/22312803/IJCTT-V36P120

MLA

M. Anusha "Data Seclusion in Multi-Owner Model using Dual-Encryption Method in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V36(2):114-118, June 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud Computing is a new era in today’s data sharing approach. Due to the availability of Public Cloud Servers (PCS) many of the Data Owners are willing to outsource their data by using PCS, there are many reasons to do so such as reduction in storage and maintenance cost, opportunity to choose the required hardware and software depending upon their necessity, easiness in adaptability of this technology…. etc. On the other side of the coin many organizations and individuals are still hesitant to outsource their sensitive information, the reason for this unwillingness is once the data is outsourced in a public cloud the owner loses the sole control of the data. Even though the CSPs (Cloud Service Providers) promise the owner to protect their data from the attackers but the data is no longer secluded from the CSP’s itself, since the CSP possesses full control of cloud hardware, software and owner’s data. Here data security is the main consideration before outsourcing the data. To relate to privacy, safe searches over encrypted cloud data have inspired more research works under the individual owner model. However, most cloud servers in real do not just handle particular owner; instead, they support several owners to share the benefits of cloud computing. Having a huge amount of data files in the cloud server, it is crucial to give multi-keyword based search service to the data user. To facilitate cloud server to perform a safe search without knowing the real data of keywords and to rank the search result the privacy of related scores between keywords and files has to be kept alive. For preventing the unauthorized persons from monitoring secret keys and pretending to be authorized data users submitting searches and downloads. In this paper, we suggest a new method for data storage firmly in cloud server using different encryption algorithms along with the secure search for data and fetching the data depending upon keywords and rank, using dynamic private key generation method and new user authentication procedure.

References
1. “A Study of Encryption Algorithms for Security”,Global Journal of Computer Science and Technology Network, Web & Security
2. W.Stallings, ``Cryptography and Network Security 6th Ed,`` Prentice Hall , ,PP. 58-309.
3. http://www.herongyang.com/Encoding/Base64- Encoding-Algorithm.html
4. “Performance Evaluation of Cryptographic Algorithms: DES and AES”, 2013 IEEE Student’s Conference on Electrical, Electronics and Computer Science
5. Cloud computing Application architectures, George reese.

Keywords
Cloud Computing, PCS (Public Cloud Server), CSP (Cloud Service Provider), Encryption, Key Generation, Authentication.