Design of Retrievable Data Perturbation Approach and TPA for Public Cloud Data Security
- 8 Downloads
In cloud computing, privacy is turn out to be the foremost difficulty. Therefore, this document is used to develop the cloud data defense by the help of an efficient data perturbation method. In the anticipated data perturbation method, the original data is recoverable whenever required. Additionally, the approach employs an enhanced cloud drops which is used to generate a noise among required mean and covariance in order get the actual data during retrieval. The privacy is preserved by means of Proxy Re-encryption algorithm on before the retrieval. During the outsourcing of data, data owner needs to ensure its security for the privacy purposes. Hereby, we have enabled a third party auditing to periodically check the perturbed data. This method is executed in the functioning platform of JAVA by way of ClouSim simulator.
KeywordsRetrievable general additive data perturbation (RGADP) Improved cloud drops generator (ICDG) Proxy Re-encryption (PRE) Third party auditor (TPA)