Volume -I , Issue -IV, April 2014


Author(s) :

Abhinav . A. Baoneand K. R. Jansi


Cloud computing is an approach to computing that leverages the efficient pooling of an ondemand, self-managed, virtual infrastructur e. It abstracts the business services fr om complex IT infrastructur e by making use of virtualization and pooling of resources. The risks involved on evaluation are that it requires trusting of cloud platform provider for availability and data security . It can also raise legal concerns while storing data outside customer premises. Intentional or unintentional release of secur e information to an untrusted environment is the major security issue which is compromised. Data confidentiality is the main thr eat often experienced by the end users while outsourcing services to thir d parties. T o overcome this scenario encryption schemes are used, but it limits the functionality of storage system since only few operations are supported over encrypted data. The proposed idea is to make use of key private proxy re-encryption scheme over encrypted data so that secur ed cloud storage system can be established. The model will not only support secur e robust data storage and retrieval but it also allows different hosts to forwar d ther e data among each other via virtual machines. The main technical work is to implement key-private PRE scheme which supports encoding operations over encrypted message as well as forwar ding operations over encoded and encrypted messages. T o add-on system integrates all operations together to provide enhanced security and restrict data breaching. Entire focus is on building a secur e cloud system which impr oves factors such as robustness,confidentiality , functionality of an application.


Cloud computing, key-private pre scheme, data confidentiality

  1. S. Kamara and K. Lauter,"Cryptographic cloud storage," in RLCPS, 2010
  2. “Summary of the amazon ec2 and amazon rds service disruption in the us east region," http://aws.amazon.com/message/65648/.
  3. M. Armbrust, A. Fox, and et al., "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley , T ech. Rep. UCB- EECS-2009-28
  4. "Microsoft cloud data breach heralds things to come,” http://www .techworld.com.au/article/3721 11/microsoft_cloud_data_ breach_heralds_things_come/.
How to Cite this Paper? [APA Style]
Abhinav . A. Baoneand K. R. Jansi, (2014), ENHANCING DA T ACONFIDENTIALITY IN CLOUD SYSTEM USINGKEY -PRIV A TE PRE SCHEME, Industrial Science Journal, http://industrialscience.org/Article.aspx?aid=31&vid=4, (April, 2014)
Full Text in PDF

Full Article in PDF Format

Comment on this article...!!!

Previous Comments...
No previous comments.


Alert Me...!!!

When new article publish, article link will mail to your mail...

Enter Your Name :
Enter Your Email ID :

For Authors

For Readers