Ensuring Data Privacy and Access Anonymity using CryptographicTechniques in Cloud Computing

Download Now Date Added: May 2013
Format: PDF

Cloud computing offers many advantages, such as data ubiquity, flexibility of access, better performance and low start up cost. However, this introduces new challenges. The main challenge is the owner's loss of control of his data and the reliance on the trustworthiness of the service provider. Secure access control policies, data integrity check and data privacy techniques to hide the data from the service provider need to be implemented. Simply encrypting the data is inefficient and is vulnerable to attacks when the access control policies change. Several techniques have been proposed to address these issues. This paper presents a novel and efficient solution that employs two layers of encryption of the data and an encrypted data object containing the second access key.