An efficient way of preserving the privacy using proxy re-encryption for shared authority accessing in cloud environment ABSTRACT Cloud computing is the technology which provides services in various forms through online . The number of online stores for storage are available to back up our data and accessing the data anywhere at anytime. Cloud computing is a pervasive advancement which gives a beneficiary way to the clients to benefit the cloud applications on interest. It refers to the network service in which services are provided with guaranteed QoS, inexpensive computing infrastructures with an easy and simple access on demand and is enabled through a set of network. Without proper security and privacy mechanisms designed for the …show more content…
Quality based access control is given to make the client to get its own particular information fields as it were. Proxy re-encryption is used to give a way to deal with sharing of information between number of clients. In this work, the Key aggregation with random key generation is utilized to combine keys if there is more than one key is produced to one file hat is partaken in the cloud. It conceals the base encryption file from the end client. The Honey encryption method is utilized to improve the proxy re-encryption cryptosystem. This proposed work will be captivating multi-client contrive of cloud applications. KEYWORDS : Cloud Computing, Privacy, Shared Authority, Authentication Protocol, Security. I. INTRODUCTION A cloud is a unique information technology (IT) environment which has been designed for the purpose of provisioning, scalable and measured information technology resources remotely. Cloud Computing Service provides IT as a service over the internet on demand basis and the payment is based on usage. Cloud computing services are provided from development platforms and full applications to servers and storage. Cloud computing is a pervasive advancement which gives a beneficiary way to the clients to benefit the cloud applications on interest. It refers to the network service in which services are provided with assured QoS, affordable computing infrastructures with an easy and simple access on demand and is enabled
Cloud computing is on the rise. Cloud computing is a style of computing where software and virtualized hardware is provided over the internet (O’Brien & Marakas, 2011). The seven most common uses of cloud computing include: infrastructure as a service, private cloud or hybrid cloud, test and deployment, big data analytics, file storage, disaster recovery and backup (Ferkoun, 2014). The biggest advantages of cloud computing include increasing competitiveness through cost reduction, greater flexibility, and elasticity and optimal resource utilization (Ferkoun, 2014). Cloud computing basically uses the internet to provide for the computing needs of the end users.
The focus of cloud computing is providing with scalable and a cheap on-demand computing infrastructure with a good quality of service levels. The process of the cloud computing involves a set of network enabled services that can be accessed in a simple and general way. Cloud computing provides with a unique value proposition for any organization to outsource their information and communication technology infrastructure. Moreover, the concept itself provides with a value proposition for an organization as using the cloud saves on cost, resources, and staff, and business opportunities for the organization (Katzan). An extensive connectivity of
Cloud computing is innovative which uses well advanced computational power resource and gigantic improvement in storage capabilities, Cloud is the long dreamed vision of computing utilities, which helps in enable ling the sharing of
According to Prasad, Gyani and Murti (2012), “Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet” (p.7). This statement is from five years ago, and although cloud computing is no longer considered new, this definition still describes what cloud computing means today. Cloud computing being private or public is becoming more primordial in the IT sector due to the numerous advantages it gives to its end users (Basmadjian et al. 2012). Since the interest in cloud computing keeps on increasing, efforts need to continue to evaluate current trends in security and privacy. Cloud computing
Cloud computing refers to an internet based computing technology where shared servers provide infrastructure, software and various other resource to customers on a “pay-as-use” basis. Cloud users need not know how the resources are managed. Hence they can concentrate on the business functionality of the service rather than the underlying functionality involved in the management of the resources. These customers do not own the physical infrastructure, but rent these resources from a third-party agency. This concept is widely utilised by the industry, government and in the educational sector due to the ability to provide robust, resilient and scalable computing power. The resources are provisioned to the user based on determining the required computing resources by the customer.
Cloud Computing is an advanced paradigm with a lot of advantages, but its distinct features also create privacy and security issues. Cloud computing provides service model which is more efficient technology for business support. Cloud computing is in fact a service based approach which has changed almost every aspect of computing technologies. There are many threats to the cloud computing including security vulnerabilities and privacy issues.
Cloud computing security is that the combination of control-based technologies like network security, pc security, info security and policies designed to bind the restrictive compliance rules. it 's primarily wont to shield info, knowledge applications and infrastructure related to cloud computing use. The zoom in field of “cloud computing” has multiplied severe security issues like securing knowledge, and examining the use of cloud by the cloud computing vendors. the most plan is to spot the foremost dangerous security threats in cloud
Cloud computing alludes to a network of computers, connected through internet, sharing the resources given by cloud providers catering to its user’s needs like scalability, usability, resource requirements. The National Institute of Standards and Technology (NIST) gave meaning of cloud computing, which demonstrates the vast majority of the key components of cloud computing [1]: "Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks,
The Cloud Computing refers to “Computing over the Internet”.It came from Grid,utility and web services.It is a combination of network,servers,storage ,operating system and virtualization technologies to form a shared infrastructure that enables web-based value added services.End users access cloud-based applications through a web browser or a light-weight desktop or mobile application.The business software and user 's data are stored on servers at a remote location. The cloud model comprises five
Abstract — Cloud Computing changed the way of computing and data and storage concept nowadays. In Cloud computing we use different type of security concepts to work with it. In present we are working with the encryption mechanism to secure the data. Encryption mechanism is failing and not capable to secure the cloud data as well as internal data theft attacks. For these problems we are proposing different approach to secure the cloud FOG COMPUTING. In this technology we will use decoy information technology to work with and we will monitor the behavior of the user to intercept the user’s behavior inside the cloud even though he/she is registered user on the cloud.
Cloud computing is a computing technology or information technology architecture used by organization or individuals. It launches data storage and interactive paradigm with some advantages like on-demand self-services, ubiquitous network access. Due to popularity of cloud services, security and privacy becomes major issue.
In this work I am proposing to design framework based on trusted computing technology to improve data security and confidentiality in the cloud. In order to do that I will work on defining protocols to make sure that data storage and replication is only done on trusted storage servers and also data access from the cloud is secure for the client and users. Cloud computing allows clients to use computing resources with option of pay per use. It is convenient option used widely in Information Technology industry. Data security and confidentiality is problematic when data transfers to third party.
Cloud Computing today has really reached in cloud 9 position.It is ever rising field in software and hardware world.Cloud Computing provides the utilities remotely.The utility it provides can be remote Operating System or it can be storage space or any such software and hardware utility.The user of cloud utilizes this resources remotely without having them in his own local machine.The local machines cannot store huge amount of data and process it,so by using cloud user can store its data on cloud for further processing.Cloud Computing principles are the reason why cloud is gaining huge success and popularity.
when we transfer data to cloud we use standard encryption tecnique to secure the data. But when we have to do computations on data stored on cloud then we have to decode data i.e provide private key every time which is not a secure method.In this paper we are introducing a technique which allow us to do computations on encrypted data which is kept on cloud on remote servers without need of any private key and without decoding it.Result of computations will be same as computations performed on raw
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.[1]