AN EFFICIENT ENCRYPTION METHOD FOR SECURING ACCESS TO CLOUD DATABASE (original) (raw)

2019, International Journal of Engineering Technology Research & Management (ijetrm)

Cloud computing is growing enormously in public and private sector organization. With the increase in number of users of cloud, there are so many concerns that need to be look out. One such major concern is about security and privacy of data being stored in cloud database. When the user is accessing his data from the cloud he should be assured about security, the data should not be accessible to unauthorized users. Unauthorized user performs number of attempts for accessing the data till he gets some information of use, which results into denial-of-service attack, brute-force attack and etc. Honey Encryption algorithm is used for protecting data by providing the bogus information to the user whenever unauthorized access is performed by the user. Thus unauthorized user will not be able to distinguish between original data and fake data; he will consider fake or bogus data as the original one. On every unauthorized attempt, it will provide different key. If the attacker has found the data then also he is not able to identify the correct one. He will work on that data and will get fake results. In this way the original data will only be accessed by authorized user only. We are proposing algorithm for secured access to cloud database using AES Encryption and Honey Encryption algorithm that will prevent unauthorized users from accessing any real sensitive information. INTRODUCTION With the exponential use of Internet, cloud computing has emerged as one of the most successful computing models in recent years and thus demand for provisioning of database services is increasing. Cloud database runs on the cloud computing platform. It is accessible from the cloud and delivered to users via the Internet from the provider's servers, on their demand. It is also referred to as Database-as-a-Service (DBaaS). Cloud database can achieve optimized scaling, high availability, multi-tenancy and effective resource allocation using cloud computing. Now a day's many organizations data are being transferred and shared via devices from the cloud database. So it is very important to properly protect information. One of the method for protecting electronic messages and other types of data is encryption. Encryption method is used for protecting user's sensitive data. Only authorized users will read the original message, and it will be inaccessible to unauthorized users. Secured access to cloud database ensures only authorized user is able to access information. This trust of secured access by cloud provider is very important for promising usage of cloud services. For this strong authentication mechanism should be employed by the cloud provider. Apart from secured access there are several issues related with the maintenance of cloud database for its proper functioning. Among these, security issues are of prime concern, which provides trust and confidence to the user that there data is in safe hands. They need not to think about how their data is operated, where it is placed, what happened to data after deletion, which else can have access to data, how to recover accidental loss of data, data integrity, ease of portability for data migration, auditing and many more. This also provides guidelines to the cloud database provider regarding promising deployment of cloud database service. Security concern has created research scope in maintenance for cloud database.