SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1310
Enhancing Availability of Data in Mixed
Homomorphic Encryption in Cloud
Bhargavi Patel
Assistant Professor, Engineering College, Tuwa, Godhra, Panchamahal, Gujarat, India
How to cite this paper: Bhargavi Patel
"Enhancing Availability of Datain Mixed
Homomorphic Encryption in Cloud"
Published in International Journal of
Trend in Scientific Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-4, June 2019,
pp.1310-1314, URL:
https://www.ijtsrd.c
om/papers/ijtsrd25
104.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
In Forthcoming times of information technology companies, cloud computing
updated as the structural model. There are so many benefits of cloud computing
in technical as well as in organization. But still there are many new objections
will carried in cloud computing for example in data security in cloud storage.
There are many approaches available for data security in cloud storage like
encryption with obfuscation technique, watermark security, data partitioning
technique. In above all the approaches, there is no possibility that cloud data
centers are operate computation on encrypted data so every time if user wants
to modify data, it is necessary to decrypt data. The most used technique for
providing security in cloud storage is Homomorphic encryption. In the
homomorphic encryption technique, there is no need to decrypt whole data
whenever user wants to update data. In the existing system used the mixed
homomorphic scheme which reduce noise level in homomorphic encryption
technique. The existing system focus on data corruption and data modification
but what if system failure and power failure occurs. The user data may be lossin
any reasons and user may not have any copy of data. The Existing system not
focus on data loss. So in proposed work focus on availability of data by erasure
code. By applying the erasure code if in any case user data is loss, will be
reconstructed which provide more security than existing system.
Keywords: Cloud Computing;DataSecurity;Homomorphic Encryption;Availability
of Data
INTRODUCTION
There are many resources are available in cloud computing
which leads in organization. By Combining the parallel
processing and distributed computing as well as grid
computing models makes the cloud computing.[10] There
are three types of services in cloud computing. First one is
the service which gives the user basic computing resources
like virtual machine, storage network in the form of cloud
storage and some processing power is called as
Infrastructure-as-a-service(IAAS).[10] Second one is the
service which provides the infrastructure of cloud with
development language and development tools on which
users can build and deploy their program is called as
Platform-as-a-service(PAAS).[10] Third one is the service
which yielded services to user. The services that runs on
infrastructure of cloud computing arranged by broker also
known as service provider is called as Service-as-a-
service(SAAS).[10] Users need not manage resources
provided by this three services, user just use this services as
payper-usage and pay the bill as per usage. There areseveral
challenges like security and privacy issues, multi-tenancy,
scalability, customizable GUI and Business logicaccordingto
business type etc.
RELATED WORK
Moving the data in the cloud provide the user with a great
efficiencies, since it don’t have tocare aboutthe complexities
of direct hardware management. By internet based online
services, using the huge amount of storage space and
customizablecomputingresources,thisplatformseliminates
the responsibilities of the local machines for data
maintenance .So for the integrity of the data users are
depended on the cloud service providers. Users’ datamostly
protected by applied distinct cryptographic algorithms like
AES, DES, RSA, etc. by broker to protect data from hackers.
All this techniques may also apply in cloud computing
environment to secure the users data files. By using the
algorithms the user loses control over the data. Therefore
without the knowledge of the data in cloud we should
provide security by HomomorphicEncryptionTechnique. As
focusing on data corruption, it is also important to focus on
data loss and data unavailability.
A. Data Security in Cloud Storage
Maintenance of data center is high in terms of cost for a low
budget organization who use small data center. The best
choice for low budget organization is to adopt cloud
computing as cloud computing provides cloud data center.
Using cloud data center, the management of data center is
removed. As water and electronic, the computation services
and storage can buy by low budget organization. The public
Storage provider can store data. [15] There are different
type of user, organizations and person can use the common
cloud data storage.
In cloud storage client is unaware of wherehisdataisstored.
On the above layer of cloud where network computing
system is stored all data. As cloud storage use by many
different persons, it is necessary to have data security in
IJTSRD25104
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1311
different levels. For different layer security, the cost should
be different. [15]
The user can lost their control from data in public cloud
so there is many security issues in public cloud. Because
all users data are stored in same place. [15]
In an organization only authorized personcanaccessthe
confidential data. So in private cloud the security is
needed to protect all storage servers. [15]
The main problem in cloud storage is how to safe users data.
In cloud, the service provider can guaranteeforprotection of
data but user cannot believe. By this Data securityis very big
thing of cloud storage. [15]
Fig 1. Framework to ensure data security [15]
Fig 1. Shows the framework which combine the scenario of
cloud storage provider and user. A guarantee between
service providers to user is called service level agreement.
Different Types of services, their qualities and userpayment
can define by SLA. In some times Users may check that data
is lost, stolen, crash. The possibility of data disaster can be
defined by SLA. There are many different technologies are
available which helps service provider to achieve SLA.
Different SLA have Different Cost.[15]
To provide data security in cloud storage there are mainly
three parts. [15]
Secure Storage
Transfer
Authority
Secure Storage: The data may be safe during any nature
disaster is the fundamental requirement of data security.
The data may be protected by dividing the user data into
number of small files and store it into differentplaces. If data
pieces in one data center or disk crashed, the data can be
resumed by left pieces. It’s an important method to remote
access performance and system availability. Cloud storage
service provider may construct data center in several
regional. Most of service provide file level save and acquire
service. How to separate files to pieces and how to place
these pieces is important to make files safe. File security
level from low to high is divided into single server level,
cross-server level, cross-cabinet-level, cross-data center
level. [15] These are divided by where the pieces stored in
cloud storage. The higher the security level higher storage
cost, cost is also higher in the Cloud computing system the
user can customize according to their different levels of the
circumstances of storage services.[15]
Transfer: The data must transfer though network. To make
the data available at any time, provider must separate data
to several data center and do some optimize in positionnear
the final user. Data saved in cloud storage often used for
cloud computing and share. To transfer an amount of data is
difficult for the existing network conditions.[15]
Authority: Authority is important to user to avoid
antiauthority access. For the storage provider, it needs todo
user authority and access control. During theuseraccess the
data in cloud, all operation should berecordedand traceable.
It’s important to make anyone else can’t see the data,
including administrator. [15]
PROPOSED SYSTEM FRMEWORK
The term Data availability is used by computer storage
manufacturers, storage service providers to describe
products and services that ensure that data continues to be
available at a required level of performance in situations
ranging from normal through disastrous. Anytime a server
loses power, for example, it has to reboot, recover data and
repair corrupted data. The time it takes torecover,known as
the mean time to recover (MTR),
could be minutes, hours or days. Data loss is an error
condition in information systems in which information is
destroyed by failures or neglect in storage, transmission, or
processing. Information systems implement backup and
disaster recovery equipment and processes to prevent data
loss or restore lost data. Data loss is distinguished from data
unavailability, which may arise from a network outage.
Although the two have substantially similar consequences
for users, data unavailability is temporary, while data loss
may be permanent.
In an existing system not focus on Data availability. In
proposed work the erasure code are used for availability of
data in case of failure. A Reed-Solomon erasure code adds
redundancy to the system to tolerate failures. By extending
the existing system after applying the homomorphic
encryption and RSA encoding and key switching matrices in
existing system then EDB block apply erasure code to this
block. So by providing the erasure code in any case system
failure or system reboot or any nature disaster happen the
data can be available to user. The user is not aware about
any failure and gets data availablewhenever required.When
user download the data first decode with erasure code and
then by applying the decryption process get the data.
B. System Architecture
In the proposed system, develop the model foravailabilityof
data in mixed-Homomorphic encryption scheme. Fig 2.
Shows the general layout of proposed work. The proposed
system work on four module: encryption, decryption done
by BGV Homomorphic encryption and for availabilityof data
encoding and decoding by Reed Solomon error correcting
erasure code.
Fig2. System Architecture of Proposed Work
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1312
PROPOSED ALGORITHM
A. Steps for Uploading File:
1. User file which he wants to upload divide into number of parts
2. All byte of user file can be encrypted by homomorphic encryption
3. Crete a separate file in which the decrypted data encoded with RSA algorithm and also have key-switching matrices.
4. Apply erasure code. There N number of bytes data in users file. This method generate thenumber of EncryptedDataBlock
per file (EDB). Every file contains number of EDB blocks. Every EDB block have key-switching matricesof k bytes,andtwo
block i.e. RSA and Decrypted data. Number of Distributed servers in cloud storage can stored this EDB block.
B. Algorithm Steps for Downloading File:
1. for finding the Encrypted data block, User can queries to all the Distributed storage servers
2. Apply decoding and recover the file if any file is missing.
3. Getting encrypted data block, user decode the data by RSA
4. After decoding, by applying the Homomorphic encryption user can decrypt the data and get the original file.
Fig3. Flow Chart of Proposed Work of Uploading Process
THEORETICAL RESULT ANALYSIS
Suppose after encryption we have ABCDEFGHIJKLMNOPencryptedformatdataavailable.Apply reedSolomon encodingtothis
data. The data converted into 4 X 4 matrix format as shown in figure 3.4. In this example, the four pieces of the file are each 4
bytes long. Each piece is one row of the matrix. The first one is “ABCD”. The second one is “EFGH”. And so on.
Fig4. Flow Chart of Proposed Work of Downloading Process
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1313
Fig5. Encrypted Data into 4X4 Matrix Format
The Reed-Solomon algorithm creates a coding matrix that you multiply with your data matrix to create the coded data. The
matrix is set up so that the first four rows of the result are the same as the first four rows of the input. That means that thedata
is left intact, and all it’s really doing is computing the parity.
The result is a matrix with two more rows than the original. Those two rows are called parity pieces. Each row of the coding
matrix produces one row of the result. So each row of the coding matrix makes one of the resulting pieces of the file.
Fig6. Encrypted Data multiply with Coding Matrix
Fig7.2 rows Data Loss out of 6 rows
The coding matrix, the matrix on the left, is invertible. There is an inverse matrix that is when multiplied by the coding matrix,
produces the identity matrix. As in basic algebra, in matrix algebra you can multiply both sides of an equation by the same
thing.
Fig8. Coding Matrix and Invert Matrix are cancel out by multiplying Invert Matrix both side
This leaves the equation for reconstructing the original data from the pieces that are available:
Fig9. Reconstruction of Original Data
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1314
CONCLUSION AND FUTURE WORK
The paper presents data availability in case of data loss and
system failure by using reed Solomon error correcting code
which is one kind of erasure code to provide better security
for cloud storage. The proposed algorithm only focus on use
of reed Solomon error correcting code as a erasure code for
provide better security and availability of data but not focus
on attacks may done on erasure code.
REFERENCES
[1] Maulik Dave, “Data Storage Security in Cloud
Computing: A Survey”, International Journal of
Advanced Research in Computer Science and Software
Engineering 2013.
[2] Dr. L. Arockian, S. monikandan,“EfficientCloudStorage
Confidentiality to Ensure Data Security”, IEEE 2014.
[3] Boopathy D, M.Sundaresan, “Data Encryption
Framework Model with Watermark Security for Data
Storage in Public Cloud Model”, IEEE 2014.
[4] Jian Li, Sicong Chen, Danjie Song, “Security structureof
cloud storage based on homomorphic encryption
scheme”, IEEE 2013.
[5] Amit Kumar Aman, Vijay Prakash, “Efficient Public
Verifiability and Data Dynamics for Storage Securityin
Hybrid Clouds”, IEEE 2013.
[6] Md. Rafiqul Islam, Mansura Habiba, “Agent Based
Framework for providing Security to data storage in
Cloud” IEEE 2012.
[7] Mehdi Hojabri, “Ensuringdatastoragesecurityincloud
computing with effect of Kerberos”, International
Journal of Engineering Research & Technology 2012.
[8] Guobo Xie, Bingying Yao, “Cloud Storage Identity
Design Based On FingerprintIdentification”,IEEE2013
[9] C. Selvakumar, G. Jeeva Rathanam, M. R. Sumalatha,
“PDDS – Improving cloud data storage security using
data partitioning technique” IEEE 2012
[10] R.Kangavalli, Dr. vagdevi S, “A Mixed Homomorphic
Encryption Scheme for Secure Data Storage in Cloud”,
IEEE 2015
[11] R.Kanagavalli and Vagdevi S,”A Survey Of
Homomorphic Encryption Schemes in Cloud Data
Storage”, IJRDET, 2014, Vol 3, p.p. 71-75.
[12] Manoj Kokane,Prem Kumar Jain,Poonam
Saranghar,”Data Storage Security in Cloud
Computing”,IJARCCE,2013.
[13] J.W.Bos,K.Lauter,J.Loftus and M.Naehrig,”Improved
security for a ringbasedfullyhomomorphicencryption
scheme”,IACR Cryptology,ePrint Archive,2013.
[14] Dr. L. Arockiam, S. Monikandan, “Data Security and
Privacy in Cloud Storage using Hybrid Symmetric
Encryption Algorithm”, International Journal of
REFERENCES Advanced Research in Computer and
Communication Engineering, Vol. 2, Issue 8, August
2013.
[15] Xiao Zhang, Hong-tao Du, Jian-quan Chen, YiLin,Lei-jie
Zeng, “Ensure Data Security in Cloud Storage”, IEEE
2011.
[16] Cloud Computing for Dummies, Wiley publishing, Inc.
[17] William Stallings, “Cryptography and Network
Security-Principles and Practice”5th Edition, 2011,
Prentice Hall.

More Related Content

What's hot

Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
ijtsrd
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
IJERA Editor
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
INFOGAIN PUBLICATION
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Journals
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 

What's hot (18)

Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
B1802041217
B1802041217B1802041217
B1802041217
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 

Similar to Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingIAEME Publication
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journals
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
eSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
eSAT Publishing House
 
50120140503020
5012014050302050120140503020
50120140503020
IAEME Publication
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
L04302088092
L04302088092L04302088092
L04302088092
ijceronline
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 

Similar to Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud (20)

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
50120140503020
5012014050302050120140503020
50120140503020
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
L04302088092
L04302088092L04302088092
L04302088092
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1310 Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud Bhargavi Patel Assistant Professor, Engineering College, Tuwa, Godhra, Panchamahal, Gujarat, India How to cite this paper: Bhargavi Patel "Enhancing Availability of Datain Mixed Homomorphic Encryption in Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-4, June 2019, pp.1310-1314, URL: https://www.ijtsrd.c om/papers/ijtsrd25 104.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT In Forthcoming times of information technology companies, cloud computing updated as the structural model. There are so many benefits of cloud computing in technical as well as in organization. But still there are many new objections will carried in cloud computing for example in data security in cloud storage. There are many approaches available for data security in cloud storage like encryption with obfuscation technique, watermark security, data partitioning technique. In above all the approaches, there is no possibility that cloud data centers are operate computation on encrypted data so every time if user wants to modify data, it is necessary to decrypt data. The most used technique for providing security in cloud storage is Homomorphic encryption. In the homomorphic encryption technique, there is no need to decrypt whole data whenever user wants to update data. In the existing system used the mixed homomorphic scheme which reduce noise level in homomorphic encryption technique. The existing system focus on data corruption and data modification but what if system failure and power failure occurs. The user data may be lossin any reasons and user may not have any copy of data. The Existing system not focus on data loss. So in proposed work focus on availability of data by erasure code. By applying the erasure code if in any case user data is loss, will be reconstructed which provide more security than existing system. Keywords: Cloud Computing;DataSecurity;Homomorphic Encryption;Availability of Data INTRODUCTION There are many resources are available in cloud computing which leads in organization. By Combining the parallel processing and distributed computing as well as grid computing models makes the cloud computing.[10] There are three types of services in cloud computing. First one is the service which gives the user basic computing resources like virtual machine, storage network in the form of cloud storage and some processing power is called as Infrastructure-as-a-service(IAAS).[10] Second one is the service which provides the infrastructure of cloud with development language and development tools on which users can build and deploy their program is called as Platform-as-a-service(PAAS).[10] Third one is the service which yielded services to user. The services that runs on infrastructure of cloud computing arranged by broker also known as service provider is called as Service-as-a- service(SAAS).[10] Users need not manage resources provided by this three services, user just use this services as payper-usage and pay the bill as per usage. There areseveral challenges like security and privacy issues, multi-tenancy, scalability, customizable GUI and Business logicaccordingto business type etc. RELATED WORK Moving the data in the cloud provide the user with a great efficiencies, since it don’t have tocare aboutthe complexities of direct hardware management. By internet based online services, using the huge amount of storage space and customizablecomputingresources,thisplatformseliminates the responsibilities of the local machines for data maintenance .So for the integrity of the data users are depended on the cloud service providers. Users’ datamostly protected by applied distinct cryptographic algorithms like AES, DES, RSA, etc. by broker to protect data from hackers. All this techniques may also apply in cloud computing environment to secure the users data files. By using the algorithms the user loses control over the data. Therefore without the knowledge of the data in cloud we should provide security by HomomorphicEncryptionTechnique. As focusing on data corruption, it is also important to focus on data loss and data unavailability. A. Data Security in Cloud Storage Maintenance of data center is high in terms of cost for a low budget organization who use small data center. The best choice for low budget organization is to adopt cloud computing as cloud computing provides cloud data center. Using cloud data center, the management of data center is removed. As water and electronic, the computation services and storage can buy by low budget organization. The public Storage provider can store data. [15] There are different type of user, organizations and person can use the common cloud data storage. In cloud storage client is unaware of wherehisdataisstored. On the above layer of cloud where network computing system is stored all data. As cloud storage use by many different persons, it is necessary to have data security in IJTSRD25104
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1311 different levels. For different layer security, the cost should be different. [15] The user can lost their control from data in public cloud so there is many security issues in public cloud. Because all users data are stored in same place. [15] In an organization only authorized personcanaccessthe confidential data. So in private cloud the security is needed to protect all storage servers. [15] The main problem in cloud storage is how to safe users data. In cloud, the service provider can guaranteeforprotection of data but user cannot believe. By this Data securityis very big thing of cloud storage. [15] Fig 1. Framework to ensure data security [15] Fig 1. Shows the framework which combine the scenario of cloud storage provider and user. A guarantee between service providers to user is called service level agreement. Different Types of services, their qualities and userpayment can define by SLA. In some times Users may check that data is lost, stolen, crash. The possibility of data disaster can be defined by SLA. There are many different technologies are available which helps service provider to achieve SLA. Different SLA have Different Cost.[15] To provide data security in cloud storage there are mainly three parts. [15] Secure Storage Transfer Authority Secure Storage: The data may be safe during any nature disaster is the fundamental requirement of data security. The data may be protected by dividing the user data into number of small files and store it into differentplaces. If data pieces in one data center or disk crashed, the data can be resumed by left pieces. It’s an important method to remote access performance and system availability. Cloud storage service provider may construct data center in several regional. Most of service provide file level save and acquire service. How to separate files to pieces and how to place these pieces is important to make files safe. File security level from low to high is divided into single server level, cross-server level, cross-cabinet-level, cross-data center level. [15] These are divided by where the pieces stored in cloud storage. The higher the security level higher storage cost, cost is also higher in the Cloud computing system the user can customize according to their different levels of the circumstances of storage services.[15] Transfer: The data must transfer though network. To make the data available at any time, provider must separate data to several data center and do some optimize in positionnear the final user. Data saved in cloud storage often used for cloud computing and share. To transfer an amount of data is difficult for the existing network conditions.[15] Authority: Authority is important to user to avoid antiauthority access. For the storage provider, it needs todo user authority and access control. During theuseraccess the data in cloud, all operation should berecordedand traceable. It’s important to make anyone else can’t see the data, including administrator. [15] PROPOSED SYSTEM FRMEWORK The term Data availability is used by computer storage manufacturers, storage service providers to describe products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through disastrous. Anytime a server loses power, for example, it has to reboot, recover data and repair corrupted data. The time it takes torecover,known as the mean time to recover (MTR), could be minutes, hours or days. Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing. Information systems implement backup and disaster recovery equipment and processes to prevent data loss or restore lost data. Data loss is distinguished from data unavailability, which may arise from a network outage. Although the two have substantially similar consequences for users, data unavailability is temporary, while data loss may be permanent. In an existing system not focus on Data availability. In proposed work the erasure code are used for availability of data in case of failure. A Reed-Solomon erasure code adds redundancy to the system to tolerate failures. By extending the existing system after applying the homomorphic encryption and RSA encoding and key switching matrices in existing system then EDB block apply erasure code to this block. So by providing the erasure code in any case system failure or system reboot or any nature disaster happen the data can be available to user. The user is not aware about any failure and gets data availablewhenever required.When user download the data first decode with erasure code and then by applying the decryption process get the data. B. System Architecture In the proposed system, develop the model foravailabilityof data in mixed-Homomorphic encryption scheme. Fig 2. Shows the general layout of proposed work. The proposed system work on four module: encryption, decryption done by BGV Homomorphic encryption and for availabilityof data encoding and decoding by Reed Solomon error correcting erasure code. Fig2. System Architecture of Proposed Work
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1312 PROPOSED ALGORITHM A. Steps for Uploading File: 1. User file which he wants to upload divide into number of parts 2. All byte of user file can be encrypted by homomorphic encryption 3. Crete a separate file in which the decrypted data encoded with RSA algorithm and also have key-switching matrices. 4. Apply erasure code. There N number of bytes data in users file. This method generate thenumber of EncryptedDataBlock per file (EDB). Every file contains number of EDB blocks. Every EDB block have key-switching matricesof k bytes,andtwo block i.e. RSA and Decrypted data. Number of Distributed servers in cloud storage can stored this EDB block. B. Algorithm Steps for Downloading File: 1. for finding the Encrypted data block, User can queries to all the Distributed storage servers 2. Apply decoding and recover the file if any file is missing. 3. Getting encrypted data block, user decode the data by RSA 4. After decoding, by applying the Homomorphic encryption user can decrypt the data and get the original file. Fig3. Flow Chart of Proposed Work of Uploading Process THEORETICAL RESULT ANALYSIS Suppose after encryption we have ABCDEFGHIJKLMNOPencryptedformatdataavailable.Apply reedSolomon encodingtothis data. The data converted into 4 X 4 matrix format as shown in figure 3.4. In this example, the four pieces of the file are each 4 bytes long. Each piece is one row of the matrix. The first one is “ABCD”. The second one is “EFGH”. And so on. Fig4. Flow Chart of Proposed Work of Downloading Process
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1313 Fig5. Encrypted Data into 4X4 Matrix Format The Reed-Solomon algorithm creates a coding matrix that you multiply with your data matrix to create the coded data. The matrix is set up so that the first four rows of the result are the same as the first four rows of the input. That means that thedata is left intact, and all it’s really doing is computing the parity. The result is a matrix with two more rows than the original. Those two rows are called parity pieces. Each row of the coding matrix produces one row of the result. So each row of the coding matrix makes one of the resulting pieces of the file. Fig6. Encrypted Data multiply with Coding Matrix Fig7.2 rows Data Loss out of 6 rows The coding matrix, the matrix on the left, is invertible. There is an inverse matrix that is when multiplied by the coding matrix, produces the identity matrix. As in basic algebra, in matrix algebra you can multiply both sides of an equation by the same thing. Fig8. Coding Matrix and Invert Matrix are cancel out by multiplying Invert Matrix both side This leaves the equation for reconstructing the original data from the pieces that are available: Fig9. Reconstruction of Original Data
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25104 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1314 CONCLUSION AND FUTURE WORK The paper presents data availability in case of data loss and system failure by using reed Solomon error correcting code which is one kind of erasure code to provide better security for cloud storage. The proposed algorithm only focus on use of reed Solomon error correcting code as a erasure code for provide better security and availability of data but not focus on attacks may done on erasure code. REFERENCES [1] Maulik Dave, “Data Storage Security in Cloud Computing: A Survey”, International Journal of Advanced Research in Computer Science and Software Engineering 2013. [2] Dr. L. Arockian, S. monikandan,“EfficientCloudStorage Confidentiality to Ensure Data Security”, IEEE 2014. [3] Boopathy D, M.Sundaresan, “Data Encryption Framework Model with Watermark Security for Data Storage in Public Cloud Model”, IEEE 2014. [4] Jian Li, Sicong Chen, Danjie Song, “Security structureof cloud storage based on homomorphic encryption scheme”, IEEE 2013. [5] Amit Kumar Aman, Vijay Prakash, “Efficient Public Verifiability and Data Dynamics for Storage Securityin Hybrid Clouds”, IEEE 2013. [6] Md. Rafiqul Islam, Mansura Habiba, “Agent Based Framework for providing Security to data storage in Cloud” IEEE 2012. [7] Mehdi Hojabri, “Ensuringdatastoragesecurityincloud computing with effect of Kerberos”, International Journal of Engineering Research & Technology 2012. [8] Guobo Xie, Bingying Yao, “Cloud Storage Identity Design Based On FingerprintIdentification”,IEEE2013 [9] C. Selvakumar, G. Jeeva Rathanam, M. R. Sumalatha, “PDDS – Improving cloud data storage security using data partitioning technique” IEEE 2012 [10] R.Kangavalli, Dr. vagdevi S, “A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloud”, IEEE 2015 [11] R.Kanagavalli and Vagdevi S,”A Survey Of Homomorphic Encryption Schemes in Cloud Data Storage”, IJRDET, 2014, Vol 3, p.p. 71-75. [12] Manoj Kokane,Prem Kumar Jain,Poonam Saranghar,”Data Storage Security in Cloud Computing”,IJARCCE,2013. [13] J.W.Bos,K.Lauter,J.Loftus and M.Naehrig,”Improved security for a ringbasedfullyhomomorphicencryption scheme”,IACR Cryptology,ePrint Archive,2013. [14] Dr. L. Arockiam, S. Monikandan, “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of REFERENCES Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 8, August 2013. [15] Xiao Zhang, Hong-tao Du, Jian-quan Chen, YiLin,Lei-jie Zeng, “Ensure Data Security in Cloud Storage”, IEEE 2011. [16] Cloud Computing for Dummies, Wiley publishing, Inc. [17] William Stallings, “Cryptography and Network Security-Principles and Practice”5th Edition, 2011, Prentice Hall.