Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reliable Multilayer Architecture for Privacy Preserving In Cloud

Author : J K Periasamy 1 Aathira H N 2 Akshya P 3 Vaishnavi R 4 Sethu Raman K 5

Date of Publication :10th July 2019

Abstract: Cloud has become an intelligent storage to the users due to its irresistible features in optimizing cooperation, regular backing up of private files and huge space for less money. Most vulnerable factor in the cloud is security breach and privacy of files. The proposed framework can take the control of data management and security over the cloud. Secured file storage algorithm based on encryptions/decryptions are used to avoid the man in middle attack. Framework is designed with three layered approach on storing the data, which adopts bucket concept algorithms to split the files as chunks and store it in the cloud, fog and local system directory. Based on the computational intelligence, this algorithm could compute the distributed proportions.

Reference :

    1. Chun-Ting Huang_, Lei Huangy, ZhongyuanQinz, Hang Yuan_, LanZhoux, Vijay Varadharajanx and C.-C. Jay Kuo”Survey on Securing Data Storage in the Cloud” Article inAPSIPA Transactions on Signal and Information Processing • January 2014
    2. ] H. Li, W. Sun, F. Li, and B. Wang, “Secure and privacy-preserving data storage service in public cloud,” J. Comput. Res. Develop., vol. 51, no. 7, pp. 1397–1409, 2014.
    3. Y. Li, T. Wang, G. Wang, J. Liang, and H. Chen, “Efficient data collection in sensor-cloud system with multiple mobile sinks,” in Proc. Adv. Serv. Comput., 10th Asia-Pac. Serv. Comput. Conf., 2016, pp. 130–143.
    4. FatemiMoghaddam F.; Karimi,O., &Alrashdan,M.T. “ A comparative study of applying realtime encryption in cloud computing environments. 2013 IEEE 2nd international conference on cloud networking
    5. Fu, Z., Wu, X., Guan, C., Sun, X., & Ren, K. (2016). “ Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement”. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.
    6. Fu, Z., Huang, F., Ren, K., Weng, J., & Wang, C. (2017).” Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data” IEEE Transactions on Information Forensics and Security, 12(8), 1874–1884.
    7. Jing-Jang Hwang, Hung-Kai Chuang, Yi-Chang Hsu, &Chien-Hsing Wu. (2011). “A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Servic”. 2011 International Conference on Information Science and Applications.
    8. Du meng “Data security in cloud computing” 8th International Conference on Computer Science & Education (ICCSE 2013) April 26-28, 2013. Colombo, Sri Lanka
    9. Tian Wang , Jiyuan Zhou, Xinlei Chen , Guojun Wang , Anfeng Liu , and Yang Liu” A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing” IEEE transactions on emerging topics in computational intelligence,vol. 2, NO.1, February 2018
    10. Prakash, G. L., Prateek, M., & Singh, I. “Data encryption and decryption algorithms using key rotations for data security in cloud system”. 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014).
    11. Z. Reitermanov´a, Charles University, Faculty of Mathematics and Physics, Prague, Czech Republic. “WDS'10 Proceedings of Contributed Papers”, Part I, 31– 36, 2010

Recent Article