Loading

Enhancing Data Confidentiality in Cloud System using Key-Private PRE Scheme
Abhinav A Baone1, K.R.Jansi2

1Mr.Abhinav A Baone, Department of Computer Science and Engineering, SRM University, (Tamil Nadu), India.
2K.R.Jansi, Assistant Professor, Department of Computer Science and Engineering, SRM University, (Tamil Nadu), India.
Manuscript received on 6 April 2014 | Revised Manuscript received on 17 April 2014 | Manuscript Published on 30 April 2014 | PP: 67-70 | Volume-3 Issue-11, April 2014 | Retrieval Number: K15930431114/14©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is an approach to computing that leverages the efficient pooling of an on-demand, self-managed, virtual infrastructure. It abstracts the business services from complex IT infrastructure by making use of virtualization and pooling of resources. The risks involved on evaluation are that it requires trusting of cloud platform provider for availability and data security. It can also raise legal concerns while storing data outside customer premises. Intentional or unintentional release of secure information to an untrusted environment is the major security issue which is compromised. Data confidentiality is the main threat often experienced by the end users while outsourcing services to third parties. To overcome this scenario encryption schemes are used, but it limits the functionality of storage system since only few operations are supported over encrypted data. The proposed idea is to make use of key private proxy re-encryption scheme over encrypted data so that secured cloud storage system can be established. The model will not only support secure robust data storage and retrieval but it also allows different hosts to forward there data among each other via virtual machines. The main technical work is to implement key-private PRE scheme which supports re-encryption over encrypted message as well as forwarding operations over re-encrypted messages. To add-on system integrates all operations together to provide enhanced security and restrict data breaching. Entire focus is on building a secure cloud system which improves the factors such as robustness, confidentiality, functionality of an application.
Keywords: Cloud Computing, Key-Private Pre Scheme, Data Confidentiality

Scope of the Article: Cloud Computing and Networking