International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 03 | Mar -2017
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
www.irjet.net
Secure Data Storage on Cloud System for Privacy Preserving Kshitija Pendhari1, Ashwini Pawar2, Aishwarya Erunkar3 , Ankush Hutke4 1Student VIII SEM, B.E., Information Technology. , RGIT, Mumbai, India 2Student
3 Student
VIII SEM, B.E., Information Technology. , RGIT, Mumbai, India VIII SEM, B.E., Information Technology. , RGIT, Mumbai, India
4 Professor, Department of IT, RGIT, Mumbai, India
---------------------------------------------------------------------***--------------------------------------------------------------------Cloud storage services may be accessed through a web Abstract - Cloud computing security processes should address the security controls the cloud provider will incorporate to maintain the customer's data security, privacy with necessary regulations. The main aim of the system which customers can take care of is to encrypt their data before it is stored on the cloud. The goal of the system is intended towards providing security service such as confidentiality in the cloud services can use Elliptic Curve Cryptography (ECC) algorithm and Shamir’s Secret sharing algorithm.
service API or through a Web-based user interface. The cloud storage architectures build a single virtual cloud storage system or cloud of clouds system.
1.1 Existing Technology
Key Words: Data Security, Cloud Technology, Elliptic Curve Cryptography (ECC), Shamir Secret key
1. INTRODUCTION Cloud is a model where users have a convenient, on- demand access to a shared pool of resources, such as servers, storage, and applications, over the Internet. Cloud computing is a type of internet-based computing that provides shared computer processing resources and data to computers. The entire process of requesting and receiving resources is automated and is completed in minutes by just sharing the keys with the authenticated users.The cloud storage is fulfilling the need for large storage space to hold all of your digital data. Cloud storage providers operate large data centers, and people who require their data to be hosted buy or lease storage capacity from them.
As shown in Figure 1, cloud storage can be used from smaller computing devices to desktop computers and servers.
RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described it in 1978. RSA is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. RSA algorithm is the first generation algorithm that was used for providing data security. It can be used to encrypt a message without the need to exchange a secret key separately. Its security is based on the difficulty of factoring large integers.
1.2 ECC Algorithm Elliptic Curve Cryptography (ECC) was discovered in 1985 by Victor Miller (IBM) and Neil Koblitz (University of Washington) as an alternative mechanism for implementing public-key cryptography. Assume that those who are going through this article will have a basic understanding of cryptography ( terms like encryption and decryption ) . The equation of an elliptic curve is given as,
Few terms that will be used, E -> Elliptic Curve Figure 1: Cloud storage
Š 2017, IRJET
|
Impact Factor value: 5.181
P -> Point on the curve |
ISO 9001:2008 Certified Journal
|
Page 1