INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 4)Publication Date: 2016-04-30
Authors : A Mustagees Shaikh;
Page : 450-453
Keywords : Cloud Storage; Data Owner; Data User; Data leak; Network Security; Privacy; Collection Intersection.;
Abstract
Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data storage. In this project we use searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and user’s queries. We build a secure searchable index, and develop a one to many order preserving mapping technique to protect those sensitive score information. The resulting design is able to facilitate efficient server side ranking without losing keyword privacy. Hence to avoid loose and loss of data, we use privacy preserving data-leak detection (DLD) solution to solve the issue where sensitive data digests is used in detection. The advantage of this method is that it enables the data owner to safely delegate the detection operation to a semi honest provider without revealing the sensitive data to the provider.In this project, we identify the challenges towards achieving privacy in searchable outsourced cloud data services and we use the DLD solution which helps to detect the leak data. This technique helps us to save securely our sensitive data in cloud storage and retrieve this data while we required without leaking our private data through Information Security and Secure Search over Encrypted Data in Cloud Storage Services.
Other Latest Articles
- STIMULATING TRANSIENT EFFECT ON BITUMEN PROPERTIES USING SASOBIT ? A WARM MIX ADDITIVE FOR PAVEMENT
- ANALYSIS OF AMBIENT AIR QUALITY IN GUWAHATI CITY ? A CASE STUDY
- MODELING-AND-FATIGUE-ANALYSIS-OF- AUTOMOTIVE-WHEEL-RIM
- SYSTEMATIC STUDY ON OBJECT DETECTION IN CLUTTERED ENVIRONMENT USING SIFT ALGORITHM
- SYNTHESIS OF LEAD SELENIDE WITH SURFACTANT (SDS) BY HYDROTHERMAL METHOD
Last modified: 2016-04-19 12:41:34