Ensuring Data Privacy and Access Anonymity using CryptographicTechniques in Cloud Computing

Cloud computing offers many advantages, such as data ubiquity, flexibility of access, better performance and low start up cost. However, this introduces new challenges. The main challenge is the owner's loss of control of his data and the reliance on the trustworthiness of the service provider. Secure access control policies, data integrity check and data privacy techniques to hide the data from the service provider need to be implemented. Simply encrypting the data is inefficient and is vulnerable to attacks when the access control policies change. Several techniques have been proposed to address these issues. This paper presents a novel and efficient solution that employs two layers of encryption of the data and an encrypted data object containing the second access key.

Provided by: IJCTT-International Journal of Computer Trends and Technology Topic: Cloud Date Added: May 2013 Format: PDF

Find By Topic