Downloads: 120 | Views: 279
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.8 / 10
Secure Data Searching and Sharing Using Third Party in Data Cloud
Ruturaj Desai, Prof. Nitin R Talhar
Abstract: Data privacy and security are the most important issues in cloud computing. To achieve higher flexibility and to reduce the cost, many data owners are outsourcing their data management systems to public cloud. Data privacy can be protected by encrypting sensitive data locally before outsourcing. The data encryption prevents the data utilization based on simple search. Thus, enabling an encrypted cloud data search service is very important. Consider, large number of data users and files in cloud, it is important for the search service to allow multi- query and provide results. Retrieving of all files having queried s will not be affordable in pay as per use cloud paradigm. In this paper, we proposed new scheme to solve the problem of multi- search over encrypted data and data sharing using trusted third party in cloud computing. We establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. We are using different cryptographic method like AES, Base64 and BlowFish for file encryption. We are using the effective principle of coordinate matching, i. e. , as many matches as possible, to capture the similarity between search query and the data file. We propose the system using the trusted third party which will allow user to share data stored on cloud without compromising data privacy. Through analysis investigating privacy and efficiency guarantee of proposed scheme is given and experiments further show proposed scheme indeed introduce low overhead on computation and communication.
Keywords: Cloud Computing, Encryption, Multi- search, Coordinate Matching, Trusted Third Party
Edition: Volume 4 Issue 7, July 2015
Pages: 1139 - 1143
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash