Privacy Data Sharing for a Group of Members in the Cloud

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-17 Number-6
Year of Publication : 2014
Authors : YaragallaSarat Babu, JayanthiRao Madina

Citation 

YaragallaSarat Babu, JayanthiRao Madina"Privacy Data Sharing for a Group of Members in the Cloud", International Journal of Engineering Trends and Technology (IJETT), V17(6),266-269 Nov 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Cloud computing is recognized as one of the alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the cloud service providers (CSPs) are able to deliver various services to cloud users with the help of powerful data centers, So that the sharingof data in the cloud is very securely and also provide the authentication of users in the cloud. In this paper we are proposed the concept digital certificate for user authentication and key establishment by providing security of data in the cloud we are using Triple Des for encryption and decryption of data. So that by using those techniques we can provide more security and low maintenance of characteristics.

References

[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H.Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I.Stoica, and M. Zaharia,“Above the clouds: A Berkeley view of cloud computing,” University ofCalifornia,Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.
[2] Amazon Web Services (AWS), Online at http://aws.amazon.com.
[3] Google App Engine, Online athttp://code.google.com/appengine/.
[4] Microsoft Azure, http://www.microsoft.com/azure/.
[5] 104th United States Congress, “Health InsurancePortability and AccountabilityAct of 1996 (HIPPA),” Online athttp://aspe.hhs.gov/admnsimp/pl104191.htm, 1996.
[6] H. Harney, A. Colgrove, and P. D. McDaniel,“Principles of policy insecure groups,” in Proc.OfNDSS’01, 2001.
[7] P. D. McDaniel and A. Prakash, “Methods andlimitations of securitypolicy reconciliation,” in Proc. Of0 SP’02, 2002.
[8] T. Yu and M. Winslett, “A unified scheme for resourceprotection inautomated trust negotiation,” in Proc.OfSP’03, 2003.
[9] J. Li, N. Li, and W. H. Winsborough, “Automated trustnegotiationusing cryptographic credentials,” in Proc. OfCCS’05, 2005.
[10] J. Anderson, “Computer Security TechnologyPlanning Study,” AirForce Electronic Systems Division,Report ESD-TR-73-51, 1972,