Loading

Security and Privacy of Data in Cloud Computing
Amar Buchade1, Rajesh Ingle2 

1Amar Buchade, Department of Computer Engineering, Pune Institute of Computer Technology, Pune, India.
2Rajesh Ingle, Department of Computer Engineering, Pune Institute of Computer Technology, Pune, India.

Manuscript received on 20 March 2019 | Revised Manuscript received on 25 March 2019 | Manuscript published on 30 July 2019 | PP: 6544-6548 | Volume-8 Issue-2, July 2019 | Retrieval Number: B3582078219/19©BEIESP | DOI: 10.35940/ijrte.B3582.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The cloud computing paradigm is being used because there is no need to setup additional IT infrastructure such as hardware and software, its low up-front cost. Security and privacy of data is important in day to today life especially for applications that uses cloud computing such as social media. Customer information that is stored at Cloud is crucial that needs to be protected against potential intruders. There is threat to maintain the data in transit and data at cloud due to different possible attacks. Due to this there is growing need of privacy and security of data. In this paper, the privacy and issues, privacy preservation techniques are addressed. In addition to this, in order to protect the data, the secret sharing algorithm is implemented and analyzed. The shamir’s secret sharing (k,n) algorithm is used to split the data into n partial shares which can be distributed in cloud. The user collects at least k partial shares to reconstruct the complete data. It is observed that if the file size is increased, the data recovery time is also increased. The paper concludes with privacy preservation guidelines.
Index Terms: Privacy, Security, Access Control, Identity Management, Homomorphic Encryption, Anonymity

Scope of the Article: Cloud Computing