Loading

A Systematic Framework for Securing Cloud Data
P Namratha1, C Shoba Bindu2

1P Namratha*, Research Scholar, Department of Computer Science and Engineering, JNTUA, Anantapur, India.
2C Shoba Bindu, Department of Computer Science and Engineering, JNTUA, Anantapur, India. 

Manuscript received on 01 August 2019. | Revised Manuscript received on 08 August 2019. | Manuscript published on 30 September 2019. | PP: 4191-4196 | Volume-8 Issue-3 September 2019 | Retrieval Number: C6000098319/2019©BEIESP | DOI: 10.35940/ijrte.C6000.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud usage has increased rapidly in many organizations and institutions. Data storage as a service is one among the cloud service, where data owner stores his information in cloud servers rather than in their own servers. Security and Privacy issues are one of the biggest challenges for cloud computing services. Cloud security intends data stored online to be safe by preventing it from being stolen and leaked. Cloud data security can be provided by adopting cryptographic techniques. Data Security includes different services like confidentiality, integrity and identity and access management. To ensure data security a systematic framework that offers key generation, confidentiality, authentication, and key exchange services. Data owner before storing his data on to cloud will implement Laplace transform based key generation service that generates an encryption key by accepting a random secret phrase (seed). Laplace transform encryption is executed by accepting generated secret key and data to provide data confidentiality. If any data user is willing to access the owner’s data he has to be verified. User’s identity as well as Owner’s identity is verified by Knowledge based Authentication. After mutual authentication initial random secret phrase is securely shared between owner and user by initiating LU-key exchange method. Proposed framework is compared with different cloud security frameworks. Computational costs and drawbacks of frameworks are interpreted.
Keywords: Authentication, Cloud Computing, Confidentiality, Security, Secret Key.

Scope of the Article:
Patterns and Frameworks