International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 279

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.8 / 10


     

Secure Data Searching and Sharing Using Third Party in Data Cloud

Ruturaj Desai, Prof. Nitin R Talhar


Abstract: Data privacy and security are the most important issues in cloud computing. To achieve higher flexibility and to reduce the cost, many data owners are outsourcing their data management systems to public cloud. Data privacy can be protected by encrypting sensitive data locally before outsourcing. The data encryption prevents the data utilization based on simple search. Thus, enabling an encrypted cloud data search service is very important. Consider, large number of data users and files in cloud, it is important for the search service to allow multi- query and provide results. Retrieving of all files having queried s will not be affordable in pay as per use cloud paradigm. In this paper, we proposed new scheme to solve the problem of multi- search over encrypted data and data sharing using trusted third party in cloud computing. We establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. We are using different cryptographic method like AES, Base64 and BlowFish for file encryption. We are using the effective principle of coordinate matching, i. e. , as many matches as possible, to capture the similarity between search query and the data file. We propose the system using the trusted third party which will allow user to share data stored on cloud without compromising data privacy. Through analysis investigating privacy and efficiency guarantee of proposed scheme is given and experiments further show proposed scheme indeed introduce low overhead on computation and communication.


Keywords: Cloud Computing, Encryption, Multi- search, Coordinate Matching, Trusted Third Party


Edition: Volume 4 Issue 7, July 2015


Pages: 1139 - 1143



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ruturaj Desai, Prof. Nitin R Talhar, "Secure Data Searching and Sharing Using Third Party in Data Cloud", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 1139-1143, https://www.ijsr.net/getabstract.php?paperid=SUB156506, DOI: https://www.doi.org/10.21275/SUB156506



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article



Top