ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Accessing the Encrypted Cloud Data in a Simultaneous, Independent and Role-Based Fashion

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 2221-2224

Keywords : Cloud computing; Cloud Security; Confidentiality; RBA;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In todays tech-savvy globalized world where ample data is available over a single click; its storage is a concern. A solution to this is the use of cloud where large amount of data can be stored. The feasibility and usefulness has made cloud computing a popular and rapidly growing field. But placing vital and confidential data outside the premises of an organization and in hands of cloud providers should come with guarantee that our data should be secure and available at any point of time. Many cyber threats are observed in cloud, due to lack of security awareness. To overcome these cyber trials in cloud, we have proposed an architecture, in which data is encrypted and then stored. There are many data storage techniques available, but we are trying to combine cloud database service along with data security and also can perform independent and concurrent operations on encrypted data. The client can perform certain basic SQL operations on the database in cloud. Apart from independence and concurrent access to this encrypted data, we also provide role based access to this data i. e data access will differ from person to person in an organization according to its designation.

Last modified: 2021-06-30 21:12:54