Privacy Preserving Approach Using Encrypted Cloud Database: Result and Analysis (original) (raw)

Study and improved data storage in cloud computing using cryptography

2021

Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-ofthe art deployment and research challenges. Due to security issues, information over the Internet is becoming important. We have suggested a method to protect critical file data. Cryptography algorithms are an efficient way to encrypt sensitive data. It is a retrieval and transmission system that is readable only by intended users. The low cost and data usability of cloud computing is advantageous. Cloud storage has many advantages at low cost and data connectivity through the Internet. Ensured cloud data protection is an important part of the cloud computing environment because customers often store sensitive information with cloud storage services but they are not secure services. So, it remains a challenge to exchange data in a safe way while storing data from an unc...

Data security in cloud environment using cryptographic mechanism

Bulletin of Electrical Engineering and Informatics, 2023

Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in public and private clouds using various encryption methods. The suggested data security paradigm offers various advantages to both consumers and providers in terms of data security. Three symmetric encryption methods are offered as a service in the cloud. The concept is implemented as a cloud-based application hosted in the cloud, and the effectiveness of three strategies is assessed. They are evaluated in terms of performance and security. Using the recommended encryption methods in a hybrid cloud environment is more efficient than using other methods. The proposed technique can be used for relational data. It can be modified and enhanced to process multimedia data.

An Overview on the Study of Data Encryption and Decryption in Cloud Computing

International Journal of Innovative Research in Computer Science & Technology, 2021

While big data technologies in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real-time is one of the greatest important issues throughout data acquisition and transfer. In order to reach an acceptable performance level, many modern applications forego data encryptions, which is unsuitable with privacy issues. In light of cloud computing concepts and features, this article examines various cloud computing systems and analyzes the cloud computing security problem and solution. Data privacy but instead service availability are major security problems in cloud computing. A single security solution will not address the cloud computing security challenge; to defend the whole cloud computing system, a mix of old and new technologies and procedures must be employed in harmony. The author demonstrates the use of encryption and decryption algorithms in terms of data confidentiality, great computational efficiency, and cloud-b...

A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environment

International Journal of Business Information Systems, 2018

As the cloud datacentres are exposed to various types of attacks, data theft/leakage is considered one of the vital attacks that may affect datacentres credibility. In this paper, a new technique is proposed to store the user's data in an encrypted form in the cloud datacentre via a third party encryption server. Therefore, the attackers and the datacentre authorities will be able to deal only with an encrypted form of the data. Furthermore, to decrypt the data, they need to know the encryption algorithm as well as the encryption key which is in turn placed on a third party encryption server. In addition, using third party encryption server (TPED) will lead to reducing the workload on both the cloud servers and the data owner's machine.

ENHANCING DATA SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER MULTI-CLOUD ENVIRONMENT

Now days cloud computing become one of the main topic of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so data security and privacy issues such as confidentiality, availability and integrity are important factor associated with it. Cloud storage provides user to access remotely store their data so it becomes necessary to protect data from unauthorized access, hackers or any type of modification and malicious behavior. Security is an important concern. The meaning of data storage security is to secure data on storage media. Cloud storage does not require any hardware and software management. it provide high quality applications. As we proposed the concept of cloud data storage security strategy capable to overcome the shortcomings of traditional data protection algorithms and improving security using steganography, encryption decryption techniques, compression and splitting technique adoptable to better security for the cloud. We have developed a desktop application through which user can share data. This paper enhanced advance security goal for cloud data storage. The boom in cloud computing over the past few years has led to a situation that is common to many innovations and new technologies: many have heard of it, but far fewer actually understand what it is and, more importantly, how it can benefit them. This whitepaper will attempt to clarify these issues by offering a comprehensive definition of cloud computing, and the business benefits it can bring. Security challenges are still amongst the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues the cloud paradigm comes with a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper provides a survey on the achievable security merits by making use of multiple distinct clouds simultaneously. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects. Cloud computing offers dynamically scalable resources provisioned as a service over the Internet. The third-party, on-demand, self-service, pay-per-use and seamlessly scalable computing resources and services offered by the cloud paradigm promise to reduce capital as well as operational expenditures for hardware and software. Cloud computing has been intended as the next generation paradigm in information Technology. From this cloud computing environment, both resources and applications are provided through the Internet as a service on demand. Cloud environment is comprised of software and hardware resources in the data centers that run different services over the internet or network to satisfy the user's needs and it depends on sharing resources instead of having local servers to handle application for a certain individual or organization [1] [2]. Since there is no infrastructure investment requires, shrink or expand the resources based on on-demand and the payment based on usage, it becomes popular among different technology aspects. The numerous cloud enterprise system looks for these advantages to be used in various applications. The service of the cloud makes it possible to access the data at anytime from anywhere. Cloud computing utilize the networks of a huge group of servers naturally brings a low

Secure Distributed Big Data Storage Using Cloud Computing *

2017

The cloud is increasingly being used to store and process the big data. Many researchers have been trying to protect big data in cloud computing environment. Traditional security mechanisms using encryption are neither efficient nor suited to the task of protecting big data in the Cloud. first discuss about challenges and potential solutions for protecting big data in cloud computing. Second, ‘Secure distributed big data storage in cloud computing’ Architecture for protecting Big Data in Cloud Computing Environment. Model ensures efficient processing of big data in cloud computing environment and gains more business insights. The data security and privacy has become a critical issue that restricts many cloud applications. One of the major concerns in security and privacy is caused by the fact that cloud operators have chances to reach the sensitive data. This concern dramatically increases user’s anxiety and reduces the adoptability of cloud computing in many fields, such as the fin...

A Computer Security System for Cloud Computing Based on Encryption Technique

Computer Engineering and Applications, 2021

In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market and development. Cloud computing is the delivery of hosting services that are provided to clients over the web. It is quite common, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that may be rapidly provisioned and released with minimal management effort or service provider interaction. Sensitive information on the cloud is developing unexpectedly and bringing up several challenges and massive security concerns of the modern-day world. The cloud data and services reside in massively scalable data centers and may be accessed ubiquitously. Some issues concern in accessing this data is the security and confidentiality of consumer dat...

AN EFFICIENT ENCRYPTION METHOD FOR SECURING ACCESS TO CLOUD DATABASE

International Journal of Engineering Technology Research & Management (ijetrm) , 2019

Cloud computing is growing enormously in public and private sector organization. With the increase in number of users of cloud, there are so many concerns that need to be look out. One such major concern is about security and privacy of data being stored in cloud database. When the user is accessing his data from the cloud he should be assured about security, the data should not be accessible to unauthorized users. Unauthorized user performs number of attempts for accessing the data till he gets some information of use, which results into denial-of-service attack, brute-force attack and etc. Honey Encryption algorithm is used for protecting data by providing the bogus information to the user whenever unauthorized access is performed by the user. Thus unauthorized user will not be able to distinguish between original data and fake data; he will consider fake or bogus data as the original one. On every unauthorized attempt, it will provide different key. If the attacker has found the data then also he is not able to identify the correct one. He will work on that data and will get fake results. In this way the original data will only be accessed by authorized user only. We are proposing algorithm for secured access to cloud database using AES Encryption and Honey Encryption algorithm that will prevent unauthorized users from accessing any real sensitive information. INTRODUCTION With the exponential use of Internet, cloud computing has emerged as one of the most successful computing models in recent years and thus demand for provisioning of database services is increasing. Cloud database runs on the cloud computing platform. It is accessible from the cloud and delivered to users via the Internet from the provider's servers, on their demand. It is also referred to as Database-as-a-Service (DBaaS). Cloud database can achieve optimized scaling, high availability, multi-tenancy and effective resource allocation using cloud computing. Now a day's many organizations data are being transferred and shared via devices from the cloud database. So it is very important to properly protect information. One of the method for protecting electronic messages and other types of data is encryption. Encryption method is used for protecting user's sensitive data. Only authorized users will read the original message, and it will be inaccessible to unauthorized users. Secured access to cloud database ensures only authorized user is able to access information. This trust of secured access by cloud provider is very important for promising usage of cloud services. For this strong authentication mechanism should be employed by the cloud provider. Apart from secured access there are several issues related with the maintenance of cloud database for its proper functioning. Among these, security issues are of prime concern, which provides trust and confidence to the user that there data is in safe hands. They need not to think about how their data is operated, where it is placed, what happened to data after deletion, which else can have access to data, how to recover accidental loss of data, data integrity, ease of portability for data migration, auditing and many more. This also provides guidelines to the cloud database provider regarding promising deployment of cloud database service. Security concern has created research scope in maintenance for cloud database.

IJERT-A Review on Clouds Security Based Encryption and Decryption Techniques

International Journal of Engineering Research and Technology (IJERT), 2021

https://www.ijert.org/a-review-on-clouds-security-based-encryption-and-decryption-techniques https://www.ijert.org/research/a-review-on-clouds-security-based-encryption-and-decryption-techniques-IJERTV10IS020122.pdf Today, large amounts of electronic data have been created, and the work of organizations that need data recovery services can suffer from various natural or man-made disasters, which can lead to huge data losses. Encryption and spatial encryption performance and average response time have been estimated based on the size of the data file. RSA encryption is often used in cloud storage. It allows cloud services to search encrypted data directly. Cloud Server provides storage and search services. To perform efficient searches, the cloud uses verification keys to maintain privacy protection or meet authentication requirements and provide equivalent proof of encrypted documents based on tokens. Most security issues are caused by people deliberately creating malicious or malicious purposes. This Paper reviews and examines some Encryption and Decryption technologies. As a result, the better solution to the symmetric key encryption and the asymmetric key encryption is provided. I INTRODUCTION Cloud computing is a distributed community that provides calculating or storage space as services to end users. The architecture / model of cloud computing is that all servers, networks, presentations or other basics connected to the facts centre are accessible to the end users. Cloud computing is upward in attention of technology and business organizations, but this is useful for solving social problems. It can also be beneficial. Cloud computing refers to online operation, configuration and access to applications. It provides online data storage, infrastructure or submissions. Cloud computing allows individuals and businesses to shift the burden by managing large amounts of data or performance processes that require computing for powerful servers. Due to the growing approval of cloud figuring, more or more data proprietors are being encouraged to subcontract their data to cloud attendants in order to provide great convenience and reduce data management costs. Data tenants provide services to many businesses and companies, and they insist on improving data security standards by following a covered method, including following: data encryption, key organization, strong admission controls, or security intellect. The cloud attendant performs query or returns encrypted papers with an additional proof according to the token generated by Data owners. The Data users will receive the result with the corresponding proof so they can verify the correctness and decrypt scrambled leaflets after verification is accurate. Concepts Of Cloud Computing-Cloud computing is an advantage of information technology / business applications. Any organization can gain this benefit by paying or renting usage. Storage, servers and applications belong to the cloud computing area and are prerequisites for on-demand access. Therefore, unlike traditional methods of building data centers, hardware, applications and applications can be executed in a secure way before concentrating on building / transmitting business solutions. Cloud computing eliminates the need for expensive data centers and management because cloud vendors provide, manage and monitor the health and accessibility of the framework. Registering a cloud is an event on the network that allows administrators to provide versatility, quality of service (QoS) and, in most cases, to ensure custom on-demand and low-cost computing infrastructure. These infrastructures can be simple and access in a universal way. Cloud computing is a model used to authorize expedient, on-demand network admission to a public pool of configurable computing value (such as systems, servers, storage, function, or management). These resources can be managed by negligible or cloud Service-fast configuration and release The term "cloud" for vendor interaction is built from the network and its schematic representation is cloud. It refers to various specific types of services or submission that have been communicated in Internet cloud, and in many cases the devices used to get these products and applications require no special applications. Cloud Architecture-The rise of cloud computing is rapidly changing business and innovative ideas and having different effects on different individuals. For utilities and IT customers, IT management (ITaaS)-that is, computing, storage and applications is transferred from the central data centre via the Internet. For Internet and software developers, this is the stage of development of web-scale programming. Operating environment For infrastructure providers and administrators, it is a huge distributed data centre infrastructure that is connected to IP networks. Top layer (application layer): The top application that is delivered as needed according to the software as a service model (SaaS).

An Enhanced Data Storage Technique on Cloud Computing

Indian Journal of Data Communication and Networking, 2021

Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A Cloud storage system is basically a storage system over a large scale that consist of many independent storage servers. During recent years a huge changes and adoption is seen in cloud computing so security has become one of the major concerns in it. As Cloud computing works on third party system so security concern is there not only for customers but also for service providers. In this paper we have discussed about Cryptography i.e., encrypting messages into certain forms, it’s algorithms including symmetric and asymmetric algorithm and hashing, its architecture, and advantages of cryptography.