A Survey on Cloud Security in DaaS with Encryption in Metadata?Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 12)
Publication Date: 2014-12-30
Authors : Swathi.C; Kavitha.S.M; Vishnupriya.S;
Page : 65-69
Keywords : Intermediate Proxy; Security; Encryption; Cloud Servers;
Cloud computing becomes popular because of its provision of flexible access to the cloud databases which allows users to access and extract the sensitive information whenever they require. The storing and accessing of information through the third party server or proxy server increases the burden of the users which leads to the time complexity and memory complexity. When the information are stored and accessed through the cloud server r proxy server, security becomes the main concern, where there is a possibility collusion of data contents. The collusion occurs because the cloud servers are not fully trustable. In the existing work, the distributed concurrent independent access to the information to the users are providing without introducing the any intermediate server. The accessing of information is done by the users directly to the cloud server where the information is without the intermediate proxies. However the encryption technologies used for encrypting the data’s before outsourcing to the clients is a complex process which may affects the user access to the database. And also existing work cannot provide the promising security guarantee to the users where the database administrator may collude a data that is honest but curious. This problem is overcome by proposing a novel encryption approach in which data item can be decrypted by using the one of the user passwords.
Other Latest Articles
Last modified: 2014-12-08 15:05:49