Shamir’s Key Based Confidentiality on Cloud Data Storage
Journal: The International Arab Journal of Information Technology (Vol.16, No. 1)Publication Date: 2019-01-01
Authors : Kamalraj Durai;
Page : 48-53
Keywords : Confidentiality; privacy; cloud computing; SKDC; privacy preserving and polynomial interpolation;
Abstract
Cloud computing is a flexible, cost effective and proven delivery platform for providing business or consumer services over the Internet. Cloud computing supports distributed service over the Internet as service oriented architecture, multi-user, and multi-domain administrative infrastructure, hence it is more easily affected by security threats and vulnerabilities. Cloud computing acts as a new paradigm where it provides a dynamic environment for end users and also guarantees Quality of Service (QoS) on data confidentiality. Trusted Third Party ensures the authentication, integrity and confidentiality of involved data and communications but fails on maintain the higher percentage of confidential rate on the horizontal level of privacy cloud services. TrustedDB on the cloud privacy preservation fails to secure the query parsers result for generating efficient query plans. To generate efficient privacy preserving query plans on the cloud data, we propose Shamir's Key Distribution based Confidentiality (SKDC) Scheme to achieve a higher percentage of confidentiality by residing the cloud data with polynomial interpolation. The SKDC scheme creates a polynomial of degree with the secret as the first coefficient and the remaining coefficients picked up at random to improve the privacy preserving level on the cloud infrastructure. The experimental evaluation using SKDC is carried out on the factors such as system execution time, confidentiality rate and query processing rate, which improves the efficiency of confidentiality rate and query processing while storing and retrieving in cloud.
Other Latest Articles
- Enhancement of Human Visual Perception-Based Image Quality Analyzer for Assessment of Contrast Enhancement Methods
- Human Facial Image Age Group Classification Based On Third Order Four Pixel Pattern (TOFP) of Wavelet Image
- Contactless Palmprint Verification System using 2-D Gabor Filter and Principal Component Analysis
- A Real Time Extreme Learning Machine for Software Development Effort Estimation
- GLCM Based Parallel Texture Segmentation using A Multicore Processor
Last modified: 2019-04-28 17:31:48