Open Access Open Access  Restricted Access Subscription or Fee Access

Accessing Secured Data in Cloud Computing Environment

N. Alaguraj, R Jayakumar

Abstract


Number of industries using cloud computing has enlarged intensely over the last few years due to the attractive topographies such as scalability, flexibility, wild start-up and low costs. Services provided over the web are ranging from using earner’s software and hardware for dealing security and other issues. Some of the biggest challenges at this point are; providing discretion and data security to subscribers of public cloud servers. An efficient encryption technique accessible in this paper can be used for protected access to and storage of data on public cloud server, moving and searching scrambled data through announcement channels while protecting statistics confidentiality. This method ensures data protection against both exterior and interior intruders. Data can be decrypted only with the provided data proprietor key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and is done in an endless time. Data access is achieved by the data owner. The proposed schema allows unauthorized modifications detection.

Keywords: Data outsourcing, privacy, public cloud severs, access control, hash function

Cite this Article
Alaguraj N, Jayakumar R. Accessing secured data in cloud computing environment. Journal of Web Engineering & Technology. 2015; 2(3): 7–13p.


Full Text:

PDF

References


Dakhane DM, Arokar AA. Data Secuity in Cloud Computing for Biometric Application. International Journal of Sci Research (IJSR). 2012; 3(6): 1–4p.

Cloud Computing Use Case Discussion Group. Cloud Computing Use Cases: White Paper. Available from: http://cloudusecases.org, 2012

Al-Sakran Hasan Omar, Bin Muhaya Fahad, Irina Serguievskaia. Efficient Cryptographic Technique for Securing and Accessing Outsourced Data. Int J Comput Sci Inf Secur. Aug 2011; 9(8).

Yang Huaqian, Wong Kwok-Wo, Liao Xiaofeng, et al. One-Way Hash Function Construction Based on Chaotic Map Network. Chaos, Soliton Fract. 2009; 41(5): 2566–2574p.

Wang W, Li Z, Owens R, et al. Secure and Efficient Access to Outsourced Data. In Proc. of ACM Cloud Computing Security Workshop. 2009; 55–65p.

di Vimercati SDC, Foresti S, Jajodia S, et al. A Data Outsourcing Architecture Combining Cryptography and Access Control. In Proc. of the ACM workshop on Computer Security Architecture. 2007; 63–69p.

S di Vimercati SDC, Foresti S, Jajodia S, et al. Over-Encryption: Management of Access Control Evolution on Outsourced Data. In Proc. of the International Conference on Very Large Databases. 2007; 123–134p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/