Vous êtes sur la page 1sur 2

International Journal of Scientific Research and Review ISSN NO: 2279-543X

A Secure and an Efficient Cloud Privacy Preservation System Using


Additional Security Concern
1Naga Ramanjaneyulu.Jetty, 2Vaddi Kasulu.Kasani, 3Dr.Guru Kesava Das. Gopisettry
1
Dept. of CSE, 2Associate Professor, Dept. of CSE, 3HOD, Dept. of CSE,
1,2,3
Eluru collegeof Engineering,
Eluru, Andhra Pradesh, India.

Abstract: Cloud computing is the inability to computer society to bring the big hierarchical system on server. The
system is very efficient and powerful. Cloud allows the facility of free hand data storage and retrieval but the
security concern is much sought tropic in cloud domain. As once the data increases chance of violence of data
integrity also increases. Cloud computing provides individuals and enterprises massive computing power and
scalable storage capacities to support a variety of big data applications in domains like health care and scientific
research, therefore more and more data owners are involved to outsource their data on cloud servers for great
convenience in data management and mining. However, data sets like health records in electronic documents
usually contain sensitive information, which brings about privacy concerns if the documents are released or shared
to partially untrusted third-parties in cloud. A practical and widely used technique for data privacy preservation is
to encrypt data before outsourcing to the cloud servers, which however reduces the data utility and makes many
traditional data analytic operators like keyword-based top-k document retrieval obsolete. In our proposed system
we add additional level of security by adding One Time Password (OTP) where the data gets uploaded with
encryption and the overall system is authenticated on registered mobile number with user consent based on OTP.

Keywords: Cloud computing, big data applications, security, One Time Password (OTP)

1. Introduction
Adoption of cloud computing is clearly a strategic direction for many companies. The convergence of
inexpensive computing, pervasive mobility, and virtualization technologies has created a platform for
more agile and cost-effective business applications and IT infrastructure. The cloud is forcing the novel
and thoughtful application of security controls, creating a demand for best practices in the security
program and governance regimes. Cloud Security and Privacy provides a guide to assist those who are
wrestling with building security in the cloud. This book is a great starting point for the cloud computing
journey. Cloud Security and Privacy provides broad coverage of terms and definitions to help both IT and
information security professionals. The book lays out the basic foundation to allow IT and information
security personnel to work together effectively on planning and implementation of cloud computing
services. For learning about cloud computing security and privacy issues, this book is a must-read. There
have been many attempts to understand cloud computing and to illustrate the security issues involved
with such technologies. This is one of the first books to explore in detail the definition of cloud
computing and to outline solutions available today to address the key risks of adopting such technologies.

2. Existing system
• Pairing-based Attribute-based encryption ABE
• The existing pairing-based ABE schemes, the number of pairing operations to decrypt a cipher text is
linear to the complexity of the access policy.
• It would be a significant challenge for users to complete the decryption independently on resource-
constrained devices, e.g., mobile phones.
• In order to reduce the number of pairing operations for users when executing the decryption algorithm,
considered outsourcing the heavy computation of decryption to a third-party service, which helps to
implement “thin clients.”

Volume 7, Issue 1, 2018 9 http://dynamicpublisher.org/


International Journal of Scientific Research and Review ISSN NO: 2279-543X

3. Drawbacks

• Higher Computational Time


• Slower Processing
• Less Security
• Inefficiency to implement in real-time

4. Proposed system

Blowfish Algorithm for secure cloud data, We propose a system based on blowfish algorithm which
makes efficient system with higher and real-time security. Whenever we upload the file and encrypt /
decrypt it in transaction the file gets OTP authentication as double level of security to the cloud data.

5. Advantages

• Highest Secure System with Second Layer of Authentication.


• Efficient encryption and decryption using Blowfish Algorithm
• Real-time Approach.
• Highest Encryption Authentication Duo

Acknowledgement

Dr.Guru Kesava Das. Gopisettry is the Professor & HOD, in CSE Department, Eluru college of
Engineering Eluru. He obtained Doctorol Degree in Engineering Ph.D(CSE) from Acharya Nagarjuna
University, in the year 2014. He received his Master's Degree in Engineering, M.E (CSE) from Anna
University, Chennai in the year 2008. He completed his Bachelor's Degree in Engineering, B.E (CSE)
from Anna University, Chennai. He has a rich experience of 17 years which includes Teaching, Research
and Administration. He served various reputed engineering colleges as a HOD for several years. He is a
multi-tasking personality and ago getter. His relentless efforts and commitment in Institutional
Administration lead few colleges to reach greater heights. He published several technical papers in
National and International Journals of repute. He is a certified professional of IBM Rational.

References

[1] C. D. Manning, P. Raghavan, H. Sch¨utze et al., Introduction to information retrieval.


[2] S. Brin and L. Page, “The anatomy of a large-scale hypertextual web search engine,”
[3] J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited
[4] D. J. Park, K. Kim, and P. J. Lee, “Public key encryption with conjunctive field keyword search,”
[5] W. M. Liu, L. Wang, P. Cheng, K. Ren, S. Zhu, and M. Debbabi, “Pptp: Privacy-preserving traffic padding in
web-based applications,”
[6] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud
computing,”
[7] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data”

Volume 7, Issue 1, 2018 10 http://dynamicpublisher.org/

Vous aimerez peut-être aussi