Secure Data Splitting Merging Techniques in Cloud Computing System
| Vol-4 | Issue-9 | September 2019 | Published Online: 16 September 2019 PDF ( 305 KB ) | ||
| Author(s) | ||
| G.Priya 1; Kawsalya .S 2 | ||
|
1Assistant professor Dept of computer science, Sri Ramalinga Sowdambiga College of science and commerce coimbatore (India) 2Assistant professor and head, dept of computer applications.kovai Kalaimagal College of arts and science Coimbatore (India) |
||
| Abstract | ||
Cloud computing is a fastest growing technology. It permits business organizations to use or access completely different applications, store information without access their personal files. Whereas considering the ability, stability and therefore the security of cloud one can’t ignore completely different threats to user’s knowledge on cloud storage. File access assure in real technique to the file protection because of untrusted cloud servers. In cloud storage system file entrance mechanism is more difficult issue. This method in consequence produces redundant copies of comparable files or involves a totally reliable cloud server. Information sharing giving security and privacy preservation are still difficult problems, particularly for an untruth cloud because of the collusion attack inside the continuous dynamical of membership progress of knowledge. It’s supported the secure key distribution without assuming any secure communication channel. Cloud storage services the vulnerabilities related to cloud-related information has increased. It affects the cloud distributed information servers that are not only used for knowledge storage, but also used for managing an enormous amount of knowledge with distributed file structures in collaborative sharing. A secure re-encryption scheme of information sharing theme without assuming secure communication channel for dynamic groups inside the cloud. Planned system give guarantee for secure sharing of knowledge files after they are outsourced with double coding and particular security key distribution mechanism. Re-encryption of message provides the data security and prevents different security attacks like man in middle attack. If an attacker tries to decrypt the massage using untruth cloud, it'll not possible for them. Users can do an effective and economical method for knowledge sharing among cluster members within the cloud with efficient manner and little management cost. |
||
| Keywords | ||
| Cloud computing; security; cloud storage; encryption; data storage; secure communication. | ||
|
Statistics
Article View: 455
|
||

