International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017
p-ISSN: 2395-0072
www.irjet.net
Techniques for Securing the Data in Cloud Computing Ms. Seema Kumari1, Mr. Prakash Pathak2, Ms. Ishita Madan3 1 Research
Scholar, CSE, MD University, Rohtak, Haryana, India Professor, CSE, WCTM, Gurugram ---------------------------------------------------------------------***--------------------------------------------------------------------23Assistant
Abstract - Cloud computing is visualized as the next-
subject to the local rules and regulations. Some of the countries allowed the vendor to access the user’s Data according to their rules and Regulation. Under such circumstances it becomes crucial for the user to ensure the security of their data before putting the data over cloud.
generation technology. It is an Internet based technology where quality services are provided to users including data and software, on remote servers .Cloud computing is also called Data outsourcing as a third party provides storage services to user. This is more cost effective for the user as there is no need of purchasing expensive hardware and software for data storage. Before data out sourcing can become possible, the data provider needs to guarantee that the data is secure, be able to make transactions, and the transactions must also be secure and not visible to the data provider. In this paper, we will discuss current techniques for securing client’s data on remote cloud server.
Availability:-Does the data that we have stored on cloud would be available whenever we required it i.e. Availability of data. When user is fully relied on data stored at cloud storage, it becomes essential that it would be easily accessed. Integrity:- The data outsourcing party must give guarantee to the user that the data that they have stored on cloud would not be modified or altered by any unauthorized user. These are some doubts which come in the mind of every user or organization who wants to switch to cloud computing. In this paper, we will discuss some techniques used for providing security of data storage in cloud computing.
Key Words: Data Security, Cloud, integrity, confidentiality, outsourcing. I.
INTRODUCTION
II. LITERATURE REVIEW
Cloud computing denotes a major change in how we store information and run applications. Now Instead of running programs and data on an individual desktop computer, everything is hosted in the “cloud”—a shared pool of computers and servers accessed via the Internet. Cloud computing provides the facility to access all the documents and application from anywhere in the world and allows multiple group members to collaborate from different locations. One of the biggest feature of cloud computing which is widely used is Data storage capability. Several free and reliable online storage services available to the users are Microsoft SkyDrive, Apple iCloud ,Google Drive, Amazon S3, Dropbox and Gspace. As we get to know so many advantages of cloud computing but everything has some pros and cons both and cloud computing is not an exception. There are some doubts in users mind before moving towards cloud computing.
Many of the researches have been done till so far in which different security techniques have been discussed. In [1], a data protection model was proposed where data is encrypted using Advanced Encryption Standard (AES) before launching in the cloud, which ensured data security. Data encryption is traditionally used to provide confidentiality while outsourcing data to cloud service provider. Hacigumus et al. [2] discusses a method for executing queries over encrypted data, at the cloud service provider’s site and suggests splitting a query into two parts, namely the server query and client query. The server query is executed over the encrypted data at the service provider side and the other part over the result of server query, at the client side.
As the use of cloud computing becomes widespread, security of the outsourced user data becomes an important research topic.
Hore et al. [3] describes techniques for building privacy preserving indices on sensitive attributes of a relational table, and provides an efficient solution for data bucketization.
The parameters that are taken into consideration for data security are Confidentiality, Integrity, and Availability. The problem of outsourcing data faces the following obstacles:
Agrawal et al.[4] highlights the benefits of using the order preserving Encryption scheme(OPES) for querying numeric data.
Confidentiality:- Can we trust some third party and share our private data with them? Does our data remain confidential over cloud? Though a service provider gives the guarantee of protecting the privacy of user data, the reality is that the data is physically located in some country and is
© 2017, IRJET
|
Impact Factor value: 5.181
Private Information Retrieval (PIR) was first discussed in [5]. PIR protocol hides the queries performed by the user on a public database, stored on a set of servers. The PIR
|
ISO 9001:2008 Certified Journal
|
Page 742