Title: Secure Data Storage over Cloud Using Content Features Processing

Author(s): Shaikh Sufiya1, Prof.Asmita Deshmukh2, Prof.Ankit Sanghvi3,Prof.Ashwini Sagar4


Alamuri ratnamala Institute of Engineering and technology, Shahpur Thane

K.C College Of engineering and Technology, Thane East

Alamuri ratnamala Institute of Engineering and technology, Shahpur Thane

Alamuri ratnamala Institute of Engineering and technology, Shahpur Thane

             

Abstract

With the advent growth of sensitive information on cloud ,Cloud security is getting more important than even before. Cloud computing is a type of computing that relies on sharing computing resources rather than having local server, or personal devices to handle applications. The cloud computing aim to providing IT as a service to the cloud user on demand basis with greater flexibility, availability ,and  reliability, with utility computing model. Millions of users, use a cloud computing for various purpose, therefore security, integrity, authentication privacy and confidentiality on the cloud is a major concern.To address this issue, cryptographic algorithm are use to protect  the private data over the cloud. The two type of algorithm is highly used in cryptography are symmetric and asymmetric for encrypting and decrypting the text .As if data used through internet is highly confidential which are not public viewing. so ,this work focuses on providing security to a data on cloud using elliptic curve cryptographic algorithm. This algorithm raises the confidentiality level to an exceptionally high standard using minimum resources as compared to other existing algorithms like RSA, DES, AES etc .The another major concern on  cloud computing is to maintain the  integrity of data stored on the cloud. Cloud server have multiple users and owners data which can be attacked or modified by outside attackers. Therefore, a new concept is added which check the data Integrity on both the module data admin and data user. This entity called data verifier. It consist of four entities data admin, cloud server ,data Verifier and data user. Data verifier perform main role of data integrity check at both the side of data owner as well as data user. It verifies the integrity of data on demand of the data owner while data owner want to verify its own uploaded data on cloud ,so that it verify whether the data  uploaded on cloud is tampered or not .where as data user can check integrity after downloading the text file which is share by data owners .This verifier scheme make use of SHA-1 Hash key algorithm for integrity check


License: This work is licensed under a Creative Commons Attribution 4.0 International License.

 

Website: http://www.ijecs.in

e-ISSN:  2319-724

GettyImages.pngace.pngajdh.pngarx.pngcit.pngcomp.pngcross.pngicn.pngino.pnglogo_wcmasthead_en.pngres.pngresbib.pngsci.pngscic.pngscics.pngsearch_logo.gifulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top