Design of Retrievable Data Perturbation Approach and TPA for Public Cloud Data Security

  • Lalit KumarEmail author
  • Vinay Rishiwal


In cloud computing, privacy is turn out to be the foremost difficulty. Therefore, this document is used to develop the cloud data defense by the help of an efficient data perturbation method. In the anticipated data perturbation method, the original data is recoverable whenever required. Additionally, the approach employs an enhanced cloud drops which is used to generate a noise among required mean and covariance in order get the actual data during retrieval. The privacy is preserved by means of Proxy Re-encryption algorithm on before the retrieval. During the outsourcing of data, data owner needs to ensure its security for the privacy purposes. Hereby, we have enabled a third party auditing to periodically check the perturbed data. This method is executed in the functioning platform of JAVA by way of ClouSim simulator.


Retrievable general additive data perturbation (RGADP) Improved cloud drops generator (ICDG) Proxy Re-encryption (PRE) Third party auditor (TPA) 



  1. 1.
    Alia, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.MathSciNetCrossRefGoogle Scholar
  2. 2.
    Wang, H. (2013). Proxy provable data possession in public clouds. IEEE Transactions on Services Computing, 6(4), 551–559.CrossRefGoogle Scholar
  3. 3.
    Wang, J., Qi, M., & Guo, B. (2016). Enabling real-time information service on telehealth system over cloud-based big data platform. Journal of Systems Architecture, 72, 69–79.CrossRefGoogle Scholar
  4. 4.
    Singh, S., Jeong, Y.-S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200–222.CrossRefGoogle Scholar
  5. 5.
    Shaukat, U., Ahmed, E., Anwar, Z., & Xia, F. (2016). Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges. Journal of Network and Computer Applications, 62, 18–40.CrossRefGoogle Scholar
  6. 6.
    Somia SahraouiandAzeddine Bilami. (2015). Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things. Computer Networks, 91, 26–45.CrossRefGoogle Scholar
  7. 7.
    Pasupuleti, S. K., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64, 12–22.CrossRefGoogle Scholar
  8. 8.
    Singh, A. P., & Pasupuleti, S. K. (2016). Optimized public auditing and data dynamics for data storage security in cloud computing. Procedia Computer Science, 93, 751–759.CrossRefGoogle Scholar
  9. 9.
    Rizvi, S. S., & Razaque, A. (2016). Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. Computers & Security, 62, 328–347.CrossRefGoogle Scholar
  10. 10.
    He, D., Wang, H., Zhang, J., & Wang, L. (2016). Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Information Sciences, 375, 48–53.CrossRefGoogle Scholar
  11. 11.
    Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859.CrossRefGoogle Scholar
  12. 12.
    Chang, V., Kuo, Y.-H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24–41.CrossRefGoogle Scholar
  13. 13.
    Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2016). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42–61.CrossRefGoogle Scholar
  14. 14.
    Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36(4), 618–625.CrossRefGoogle Scholar
  15. 15.
    Usman, M., Jan, M. A., & He, X. (2016). Cryptography-based secure data storage and sharing using HEVC and public clouds. Information Sciences, 387, 90–102.CrossRefGoogle Scholar
  16. 16.
    Zhao, J., Wang, L., Tao, J., Chen, J., Sun, W., Ranjan, R., et al. (2014). A security framework in G-Hadoop for big data computing across distributed Cloud data centres. Journal of Computer and System Sciences, 80(5), 994–1007.MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.CSIT, Department of Computer Science and information TechnologyMJPR UniversityBareillyIndia
  2. 2.CSIT, FET, Department of Computer Science and TechnologyMJPR UniversityBareillyIndia

Personalised recommendations