Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

PSDS: Privacy Preserving System for Data Security Implementation and Countermeasures

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Arpit Sohani, Khushboo Sawant

Arpit Sohani and Khushboo Sawant. PSDS: Privacy Preserving System for Data Security Implementation and Countermeasures. International Journal of Computer Applications 156(4):21-25, December 2016. BibTeX

	author = {Arpit Sohani and Khushboo Sawant},
	title = {PSDS: Privacy Preserving System for Data Security Implementation and Countermeasures},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {156},
	number = {4},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {21-25},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2016912415},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The Cloud computing is a latest technology which provides various services through internet. The Cloud allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data.Search over encrypted data is a technique of great interest in the cloud computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud servers in order to ensure user data privacy. In this paper, we proposed cryptography based Privacy Preserving System of Data Security i.e. PSDS. We implement AES algorithm to perform encryption and decryption. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when assessing shared data integrity.


  1. Wang, Cong, et al. "Toward publicly auditable secure cloud data storage services." IEEE network 24.4 (2010): 19-24.
  2. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest,” in Proc. of HotOS’07. Berkeley, CA, USA: USENIX Association, 2007, PP. 1-6.
  3. C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proceeding IEEE INFOCOM, 2012.
  4. Cong Wang, Ning Cao and KuiRen, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data” IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 8, August 2012.
  5. Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Towards Secure and Dependable Storage Services in CloudComputing," To appear, IEEE Transactions on Service Computing (TSC)
  6. Preeti Gulab Sonar and Pratibha Dattu Shinde, “A Novel Approach for Secure Group Sharing in Public Cloud Computing”, International Journal of Computer Applications (IJCA), Volume 127 – No.11, October 2015.
  7. Omkar Patil, Ashish Tonde, Chinmay Sapkale and Smita Bansod, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing – A Survey”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2, February 2016.
  8. M. Kundalakesi, Sharmathi R and Akshaya.R, “Overview of Modern Cryptography”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 6, PP. 350-353, 2015
  9. Mohammed AbuTaha, MousaFarajallah and Radwan Tahboub, “Survey Paper: Cryptography is the Science of Information Security”, International Journal of Computer Science and Security (IJCSS), PP. 298- 309, Volume (5), 2011.
  10. PrakashKuppuswamy, and Saeed Q. Y. Al-Khalidi, “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, MIS Review: An International Journal, Volume 19, No. 2, PP. 1-13, March 2014.
  11. Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou,“Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, in INFOCOM, 2010 Proceedings IEEE, PP. 1–9, 2010.
  12. Cong Wang, Sherman SM Chow, and Wenjing Lou, Privacy Preserving Public Auditing for Secure Cloud Storage,
  13. Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou, Privacy Preserving Public Auditing for Secure Cloud Storage, Computers, IEEE Transactions on, 62(2), PP. 362–375, 2013.
  14. S Ezhil Arasu, B Gowri, and S Ananthi. Privacy-Preserving Public Auditing in cloud using HMAC Algorithm, International Journal of Recent Technology and Engineering (IJRTE), 2013.
  15. Jadhav Santosh and B.R nandwalkar, Privacy Preserving and Batch auditing in Secure Cloud Data Storage using AES, Proceedings of 13th IRF International Conference, 2014


Data Security, Encryption, Decryption, AES, Cloud Computing, Cryptography, Privacy Preserving.