Loading

Secure Data Access Privacy Preserving using Cloud Services
M. Suguna1, D. Prakash2, Cynthia. J3

1M. Suguna, Assistant Professor, Department of CSE, Kumaraguru College of Technology, Coimbatore (Tamil Nadu), India.
2D. Prakash, Assistant Professor, Department of EEE, SREC, Coimbatore (Tamil Nadu), India.
3Cynthia. J, Professor, Department of CSE, Kumaraguru College of Technology, Coimbatore (Tamil Nadu), India.
Manuscript received on 13 December 2018 | Revised Manuscript received on 24 December 2018 | Manuscript Published on 09 January 2019 | PP: 321-324 | Volume-7 Issue-4S November 2018 | Retrieval Number: E1985017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In spite of the tremendous computational advantages, outsourcing data to the public cloud is also preventing customers’ direct control over the systems that use their data, which unavoidably brings in new security challenges. Cloud computing gives numerous advantages and unparalleled convenience for the cloud customers to get the on-demand access of cloud provided that the local infrastructure limitations need not be taken into account. While accessing data, there may be a co-operative relationship among different users which makes sharing and exchanging of information, a tedious process. The view of current security solutions is mainly on authentication to apprehend that the data of an individual cannot be approached illegally, but there arose a privacy issue when a user request for data sharing to other users through cloud server. The users’ privacy may be exposed by challenged access request itself regardless of whether the data access permission for the user is obtained or not. In the proposed system, a privacy-preserving authentication protocol is employed to prevent the above privacy complications. In this technique, authority of data through shared access is achieved by the process of sending anonymous access request which gives privacy to the cloud users. Access control is based on attributes so that the cloud users can only access their own authorized data fields. Advanced encryption standard algorithm is used to achieve data anonymity and data protection. The proposed method dealt with secure privacy preserving data access authority is attractive for multiple-user in cloud real time storage.
Keywords: Cloud Computing, Authentication Protocol, Shared Authority, Privacy Preservation, Data Anonymity.
Scope of the Article: Cloud, Sensor Cloud and Mobile Cloud Security