Loading

Increasing Privacy for Private Database in Cloud Environment
S. Kirubakaran1, S. Karthick2, S. P. Prakash3

1S. Kirubakaran, Assistant Professor Level II, Department of ECE, Bannari Amman Institute of Technology, Sathyamangalam (Tamil Nadu), India.
2S. Karthick, Assistant Professor Level II, Department of ECE, Bannari Amman Institute of Technology, Sathyamangalam (Tamil Nadu), India.
3S. P. Prakash, Assistant Professor Level II, Department of ECE, Bannari Amman Institute of Technology, Sathyamangalam (Tamil Nadu), India.
Manuscript received on 15 December 2018 | Revised Manuscript received on 26 December 2018 | Manuscript Published on 09 January 2019 | PP: 394-397 | Volume-7 Issue-4S November 2018 | Retrieval Number: E2012017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: After Personal computing, main frame and client server Cloud computing is a fifth generation computing. It focuses on resource sharing and computations and is a network based environment. The data will be stored enduringly information in servers on the internet and cached momentarily on clients. It has the advantage of sinking cost by allocation of computing and resource storage. Azure, EC2 Application og Google, Aneka are the processor that utilize for its operation for effective computations. The necessary resources are utilized by user through the internet. The will be raise in confidentiality issue when provider depends on other provider for resource utilizing. As there is no limits in cloud computing the data can be physically positioned anywhere in the globe. Hence the problems regarding data authentication and privacy are in raise. The privacy can be obtained by imposing access policy or by encrypting using cryptographic tools. Without leaking the important information of the owner the safety can be made ensured by safeguarding from hackers. In this proposed work a implementation authentication and authentication based on data access module and anonymity. Programming is carry out using JAVA platform and back up management using MySQL and Advanced Encryption Standard security algorithm is apply for ensuring security framework.
Keywords: Data Authentication, Anonymity, Encryption Standard, Security.
Scope of the Article: Database Theory and Application