Secure and Efficient Data Transaction over Cloud Based On Signature Generation Technique

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-17 Number-6
Year of Publication : 2014
Authors : GundaSowjanya, V.Lakshmiprasad

Citation 

GundaSowjanya, V.Lakshmiprasad"Secure and Efficient Data Transaction over Cloud Based On Signature Generation Technique", International Journal of Engineering Trends and Technology (IJETT), V17(6),270-275 Nov 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

In cloud, transactional database provides authorization, it is one of most important for proof of authorization, it I the base for performance evaluation. In this paper we are concentrating on mainly on three concepts i.e. one is the authorization of users in the cloud. For this we are using concept of digital signature for user authentication. Second one id for accuracy of each transaction, we implemented group key protocol for sharing of data in the cloud. Third one is security of cloud transaction we are AES algorithm for encryption and decryption of cloud transaction. Before performing encryption and decryption of transaction data if check the given transaction coming from the trust user or not. By performing trusted transaction database we are using file transfer technique for generation trusted transaction or not. After completion of trusting we can perform encrypt and decrypt operation of transactional database. By providing those technique we are provide high performance, accuracy and more precision for secure cloud transaction.

References

[1] M. Nabeel and E. Bertino, “Privacy preserving delegated access control in the storage as a service model,” in EEE International Conference on Information Reuse and Integration(IRI), 2012.
[2] E. Bertino and E. Ferrari, “Secure and selective disseminationof XML documents,” ACM Trans. Inf. Syst. Secur., vol. 5, no. 3,pp. 290–331, 2002.
[3] G. Miklau and D. Suciu, “Controlling access to publisheddata using cryptography,” in VLDB ’2003: Proceedings of the29th international conference on Very large data bases. VLDBEndowment, 2003, pp. 898–909.
[4] N. Shang, M. Nabeel, F. Paci, and E. Bettino, “A privacy preserving approach to policy-based content dissemination,”in ICDE ’10: proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 2010.
[5] M. Nabeel, E. Bertino, M. Kantarcioglu, and B. M. Thuraisingham,“Towards privacy preserving access control in thecloud,” in Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing,ser. CollaborateCom ’11, 2011, pp. 172–180.
[6] M. Nabeel, N. Shang, and E. Bertino, “Privacy preserving policybased content sharing in public clouds,” IEEE Transactionson Knowledge and Data Engineering, 2012.
[7] S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: Management of access control evolution on outsourced data,” in Proceedings of the33rd International Conference on Very Large Data Bases, ser. VLDB’07. VLDB Endowment, 2007, pp. 123–134.
[8] M. Nabeel and E. Bertino, “Towards attribute based group key management,” in Proceedings of the 18th ACM conference on Computer and communications security, Chicago, Illinois, USA, 2011.
[9] A. Fiat and M. Naor, “Broadcast encryption,” in Proceedings ofthe 13th Annual International Cryptology Conference on Advancesin Cryptology, ser. CRYPTO ’93. London, UK: Springer-Verlag, 1994, pp. 480–491.
[10] D. Naor, M. Naor, and J. B. Lotspiech, “Revocation and tracing schemes for stateless receivers,” in Proceedings of the21st Annual international Cryptology Conference on Advances inCryptology, ser. CRYPTO ’01. London, UK: Springer-Verlag, 2001, pp. 41–62.
[11] J. Li and N. Li, “OACerts: Oblivious attribute certificates,”IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 340–352, 2006.
[12] T. Pedersen, “Non-interactive and information-theoretic secureverifiable secret sharing,” in CRYPTO ’91: Proceedings of the11th Annual International Cryptology Conference on Advances inCryptology. London, UK: Springer-Verlag, 1992, pp. 129–140.
[13] M. Nabeel and E. Bertino, “Attribute based group key management,”IEEE Transactions on Dependable and Secure Computing, 2012. [14] A. Shamir, “How to share a secret,” The Communication ofACM, vol. 22, pp. 612–613, November 1979.