Data Storage in Cloud Environment Enhance Privacy

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2013 by IJCTT Journal
Volume-4 Issue-3                           
Year of Publication : 2013
Authors :Treesa Maria Vincent, J.Sakunthala

MLA

Treesa Maria Vincent, J.Sakunthala"Data Storage in Cloud Environment Enhance Privacy"International Journal of Computer Trends and Technology (IJCTT),V4(3):241-246 Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Cloud data have to be encrypted to protect data privacy, before outsourced to the commercial public cloud. The encryption process makes effective data utilization service a very challenging task. Traditional searchable encryption techniques allow users to securely search over encrypted data through keywords. They support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge amount of data files in cloud. The system facilitates server side ranking without keyword privacy. Search result authentication is provided in the system. The similarity analysis scheme is used to identify the query results under the cloud data storage.

References-

[1] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th Int’l Conf. Distributed Computing Systems (ICDCS ’10), 2010.
[2] P. Mell and T. Grance, “Draft Nist Working Definition of Cloud Computing,” http://csrc.nist.gov/groups/SNS/cloudcomputing/ index.html, Jan. 2010.
[3] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009.
[4] Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing,” http://www.cloudsecurityalliance.org, 2009.
[5] Z. Slocum, “Your Google Docs: Soon in Search Results?” http://news.cnet.com/8301-17939_109-10357137-2.html, 2009.
[6] B. Krebs, “Payment Processor Breach May Be Largest Ever,”

Keywords— Encryption, Searchable encryption technique, Boolean search, Server side ranking, Search result authentication, Similarity analysis scheme.