CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

PSDS: Privacy Preserving System for Data Security Implementation and Countermeasures

by Arpit Sohani, Khushboo Sawant
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 4
Year of Publication: 2016
Authors: Arpit Sohani, Khushboo Sawant
10.5120/ijca2016912415

Arpit Sohani, Khushboo Sawant . PSDS: Privacy Preserving System for Data Security Implementation and Countermeasures. International Journal of Computer Applications. 156, 4 ( Dec 2016), 21-25. DOI=10.5120/ijca2016912415

@article{ 10.5120/ijca2016912415,
author = { Arpit Sohani, Khushboo Sawant },
title = { PSDS: Privacy Preserving System for Data Security Implementation and Countermeasures },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 4 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number4/26697-2016912415/ },
doi = { 10.5120/ijca2016912415 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:01:41.635920+05:30
%A Arpit Sohani
%A Khushboo Sawant
%T PSDS: Privacy Preserving System for Data Security Implementation and Countermeasures
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 4
%P 21-25
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Cloud computing is a latest technology which provides various services through internet. The Cloud allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data.Search over encrypted data is a technique of great interest in the cloud computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud servers in order to ensure user data privacy. In this paper, we proposed cryptography based Privacy Preserving System of Data Security i.e. PSDS. We implement AES algorithm to perform encryption and decryption. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when assessing shared data integrity.

References
  1. Wang, Cong, et al. "Toward publicly auditable secure cloud data storage services." IEEE network 24.4 (2010): 19-24.
  2. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest,” in Proc. of HotOS’07. Berkeley, CA, USA: USENIX Association, 2007, PP. 1-6.
  3. C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proceeding IEEE INFOCOM, 2012.
  4. Cong Wang, Ning Cao and KuiRen, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data” IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 8, August 2012.
  5. Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Towards Secure and Dependable Storage Services in CloudComputing," To appear, IEEE Transactions on Service Computing (TSC)
  6. Preeti Gulab Sonar and Pratibha Dattu Shinde, “A Novel Approach for Secure Group Sharing in Public Cloud Computing”, International Journal of Computer Applications (IJCA), Volume 127 – No.11, October 2015.
  7. Omkar Patil, Ashish Tonde, Chinmay Sapkale and Smita Bansod, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing – A Survey”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2, February 2016.
  8. M. Kundalakesi, Sharmathi R and Akshaya.R, “Overview of Modern Cryptography”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 6, PP. 350-353, 2015
  9. Mohammed AbuTaha, MousaFarajallah and Radwan Tahboub, “Survey Paper: Cryptography is the Science of Information Security”, International Journal of Computer Science and Security (IJCSS), PP. 298- 309, Volume (5), 2011.
  10. PrakashKuppuswamy, and Saeed Q. Y. Al-Khalidi, “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, MIS Review: An International Journal, Volume 19, No. 2, PP. 1-13, March 2014.
  11. Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou,“Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, in INFOCOM, 2010 Proceedings IEEE, PP. 1–9, 2010.
  12. Cong Wang, Sherman SM Chow, and Wenjing Lou, Privacy Preserving Public Auditing for Secure Cloud Storage,http://eprint.iacr.org/2009/579.pdf
  13. Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou, Privacy Preserving Public Auditing for Secure Cloud Storage, Computers, IEEE Transactions on, 62(2), PP. 362–375, 2013.
  14. S Ezhil Arasu, B Gowri, and S Ananthi. Privacy-Preserving Public Auditing in cloud using HMAC Algorithm, International Journal of Recent Technology and Engineering (IJRTE), 2013.
  15. Jadhav Santosh and B.R nandwalkar, Privacy Preserving and Batch auditing in Secure Cloud Data Storage using AES, Proceedings of 13th IRF International Conference, 2014
Index Terms

Computer Science
Information Sciences

Keywords

Data Security Encryption Decryption AES Cloud Computing Cryptography Privacy Preserving.