KEY BASED DATA STORAGE SECURITY IN CLOUD COMPUTING (Review)
Journal: Iord journal of science & technology (Vol.02, No. 01)Publication Date: 2014-12-10
Authors : Nikita V. Pathrabe Prof.D.M. Khatwar;
Page : 06-10
Keywords : Key Words: - Homomorphic token; Distributed scheme; Data redundancy; Cloud;
Abstract
Abstract: ?Cloud computing has a big problem as security and outsource about the data like edit, delete or update the data. Consumption of highly sensitive data or information on cloud having privacy problem. The data encryption may increase the security thread in some extends but it fall in the problem about data access fastly. The processes that we introduce is Searchable Symmetric Encryption (SSE) which allows retrieval of encrypted data over cloud. So in this paper we fully focus on data privacy issues with the help of Searchable Symmetric Encryption (SSE). Now this is the first time we are going to use similarity relevance and scheme robustness to solve the privacy issues. We found in some system or server that the data privacy is leaks with the use of Order-Preserving Encryption (OPE). To eliminate this leakage, we propose a Two-Round Searchable Encryption (TRSE) scheme that supports Top-kmultikeyword retrieval. In TRSE we introduce a vector space model and homomorphic encryption methods. In that the vector space model will helps to provide sufficient search accuracy, which enables users to involve in the ranking. As a result, information leakage can be eliminated and data security is ensured. So through security and performance analysis show that the propose scheme in this paper guarantees about high security and fully efficient data management.
Other Latest Articles
- A REVIEW FACE RECOGNITION BY USING NEAR SET THEORY
- EFECT OF CUTTING SPEED, FEED RATE AND DEPTH OF CUT ON SURFACE ROUGHNES OF MILD STEEL IN TURNING OPERATION
- TRACKING OF SCENE IN VIDEO BY USING JOINT COLOUR AND TEXTURE HISTOGRAM METHOD
- COLOR EXTENDED OPTICAL CRYPTOGRAPHY USING RANDOM SHARES FOR VISUAL TRANSFERRING SCHEME
- IP PBX: ARCHITECTURE AND PROTOCOLS
Last modified: 2015-01-13 16:19:57