Accessing Data From Cloud Using Cryptography
Accessing Data From Cloud Using Cryptography
1. INTRODUCTION
With
tremendous
increase
in
latest
has
its
key
that
updates
data
Section
3deals
whit
proposed
12
Features
2. LITERATURE SURVEY
System
Ruj
et.al
[6]
process.
Proposed
Brinkman
et.al
Goikar
et.al
[18]
Decentralized
process
to
access data.
No client
service
provider
awareness
Centralized
Uses
GPS
receiver
to
find location
of data and
decrypt it. If
location not
found,
then
data cannot be
accessed.
Uses
system
with
interoperability
between
and
client
service
providers.
hash
function
to
data
found at given
location, then it
moves to next
location
than
process.
lead
to
risk
of
intruders
attackers.
Goh
et.al
[3]
Used trapdoor
to search for
data but not
suitable
for
multiple
keywords
search.
Performs
sequential
is
If
not
rather
stopping
Handles
multiple
keyword
searches.
Performs
13
[20]
search of data
by using bilinear maps.
Bi-linear
maps
has
disadvantage
that they may
point
to
multiple
locations with
same
time
periods.
sequential
search
using
one-way
free
function
that points to
multiple
collision
hash
locations
at
different
time
utilized
as
it
lacks
periods.
5. PROPOSED
SYSTEM
client
follows:
and
CRYPTOGRAPHIC
cloud
service
provider
is given below:-
at
different
memory
locations.
14
6. Working
data.
system
sent
untrusted
the
sites
process
by
of
encryption.
a service provider.
from
involving
The
process
of
encryption
15
secured
environment.
interoperability
securely.
If
to
access
system
is
data
made
data
from
public
cloud
It
data,
being
for
decryption key.
hash
put
into
functions
queue
map
to
same
cloud
service
provider
again
memory
16
9. REFERENCES
Journal
ofComputer
Science
and
to
Outsourced
Data,
2010
Fourth
International
Conference
on
17
Threats,
computer
Chuprat,
lailAbManan,
Suriayati&Jamalul-
(2014)
Trusted
Cloud
International
Journal
Science
on
and
Engineering(IJCSE)2011
[18]. Goikaret.al , Improve Security of
data access in cloud computing using
location,
10, No 2, pp 240-250
sefidab,
Reza
EbrahimiAtani,
Using
International
Journal
of
reference
Security
of
Data
Access
in
Cloud
GurudattKulkarniet
architecture:
Cloud
service
al,
Cloud
Public-key encryption
Conference
systems,
on
telecommunication
Services
and
Applications(TSSA),IEEE,2012
with keyword
18