Escolar Documentos
Profissional Documentos
Cultura Documentos
RESEARCH ARTICLE
OPEN ACCESS
ABSTRACT
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud
computing offers potential benefits including cost savings an d improved business outcomes. However, there are a variety
of information security risks that need to be carefully considered [5]. Risks will vary depending on the sensitivity of the
data to be stored or processed, and how the chosen cloud vendor (also referred to as a cloud service provider) has
implemented their specific cloud services. The Sensitive user data is unencrypted currently which is presented to remote
third party service providers mach ines, and there is high risk of utilisation of this sensit ive informat ions. Currently there
exists no effective way for protecting users' sensitive data from service providers in cloud computing [4]. In this paper, a
methodology is presented to protect users confidential data fro m service p roviders. As data own ers no longer physically
possess the storage of their data, traditional cryptographic primit ives for the purpose of data security protection cannot be
directly adopted. In particular, simply downloading the data for its integrity verification is not a prac tical solution due to
the high cost of input/output (I/O) and transmission across the network [2]. We have two major approaches to ensure
protection of users confidential data namely Information hiding and Obfuscation of Data.
Keywords:- Data Confidentiality; Cloud Computing System Architecture; Data Obfuscation
I.
INTRODUCTION
CONFIDENTIALITY
ISSN: 2347-8578
www.ijcstjournal.org
Page 105
International Journal of Computer Science Trend s and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
III.
FORMULATION
STATEMENT
OF
PROBLEM
ISSN: 2347-8578
www.ijcstjournal.org
Page 106
International Journal of Computer Science Trend s and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
Only the data owner can dynamically interact with the CS
to update her stored data, while users just have the
privilege of file read ing. We focus on how to ensure
publicly auditable secure cloud data storage services. As
the data owner no longer possesses physical control of the
data, it is of crit ical importance to allow the data owner to
verify that his data is being correct ly stored and maintained
in the cloud. Considering the possibly large cost in terms of
resources and expertise, the data owner may resort to a
TPA for the data auditing task to ensure the storage
security of her data, while hoping to keep the data private
fro m the TPA. We assume the TPA, who is in the business
of auditing, is reliable and independent, and thus has no
incentive to collude with either the CS or the owners
during the auditing process. The TPA should be able to
efficiently audit the cloud data storage and without any
additional Online burden for data owners.
VI.
If the user wants to access data from the cloud server then
user needs to obtain the MAC and key from the data
owner. Credentials will be given by owner to the user.
MODEL INETRACTIONS
ISSN: 2347-8578
VII.
www.ijcstjournal.org
Page 107
International Journal of Computer Science Trend s and Technology (IJCST) Volume 3 Issue 6, Nov-Dec 2015
VIII. CONCLUSIONS
[10]
AUTHORS PROFILE
Vinay Kumar is completed his bachelors in
Computer Science in VTU and M asters in
Information Technology in Mysore University.
He has an inter-disciplinary expertise benefit of
being a IT Post graduate & having experience
in Operations and M aintenance at BESCOM .
His
areas of interests are Smart Grid,
CloudComputing, Scada &AM I.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
ISSN: 2347-8578
www.ijcstjournal.org
Page 108