An Empirical Model of Double Secure Method for out sourced Databases
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2016 by IJETT Journal|
|Year of Publication : 2016|
|Authors : Yeluri Venky, Suneetha Vesalapu
Yeluri Venky, Suneetha Vesalapu"An Empirical Model of Double Secure Method for out sourced Databases", International Journal of Engineering Trends and Technology (IJETT), V32(4),175-179 February 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
In cloud service providers the storage is main task and very hard task. In third party server the data which is store by the owner have to maintain privacy over the data and defend from leakage. Single time encoding is very common process for providing security to the data. But considering the malicious attacks in the network channel we propose a framework for providing the double security to the data. We have implemented double encoding technique for providing more protection of data which is store in third party servers.And we introduced a double layer protection and we used symmetric key cryptographic techniques secure data. In this process data encrypted twice and store in cloud. Only authenticated users only access the information and we limited the user privileges over the cloud service.It supports more scalability of users. This contains secure public tags and verification process such as auditing. It reduces work load to server because simple verification process is only done by server all other security issued can done by auditing. Furthermore, our auditing scheme incurs less communication cost and less computation cost of the auditor by moving the computing loads of auditing from the auditor to the server.
 Lee, D. Patterson, A. Rabkin, I. Stoica, and M.Zaharia (2009, Feb. 10). Above the clouds: A Berkeley view of cloud computing. EECS Dept. University of California, Berkeley, No.UCB/EECS-2009-28[Online].Available: http://radlab.cs.berkeley.edu/
 H. Takabi, J.B.D. Joshi, and G-J.Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security & Privacy, vol. 8, no. 6, 2010.
 R. Buyya, C. S. Yeo, and S. Venugopal, Market oriented cloud computing: vision, hype, and reality, for delivering IT services as computing utilities, Proc. 10th IEEE International Conference on High Performance Computing and Communications.
 Aafaq Ahmad Peerzada, Er.RishmaChawla,” An Analytical Review of the Multimedia Data and Encryption Mechanism at Cloud Server” 10th IEEE International Conference on High Performance Computing and Cloud Security.
 Dalian, Daemen, Joan; Rijmen, Vincent (9/04/2003). "AES Proposal: Rijndael". National Institute of Standards and Technology.p.1.Retrieved 21 February 2013.
 Jump up^ John Schwartz (October 3, 2000). "U.S. Selects a New Encryption Technique". New York Times. China, Sept 2008.
 Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno, Mike Stay (May 2000). "The Twofish Team`s Final Comments on AES Selection".
Furthermore, our auditing scheme incurs less communication cost and less computation cost of the auditor by moving the computing loads of auditing from the auditor to the server.