International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-8,Issue-5  ( May, 2020 )
Past issues
  1. Volume-8,Issue-4  ( Apr, 2020 )
  2. Volume-8,Issue-3  ( Mar, 2020 )
  3. Volume-8,Issue-2  ( Feb, 2020 )
  4. Volume-8,Issue-1  ( Jan, 2020 )
  5. Volume-7,Issue-12  ( Dec, 2019 )
  6. Volume-7,Issue-11  ( Nov, 2019 )
  7. Volume-7, Issue-10  ( Oct, 2019 )
  8. Volume-7, Issue-9  ( Sep, 2019 )
  9. Volume-7, Issue-8  ( Aug, 2019 )
  10. Volume-7, Issue-7  ( Jul, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 88
Paper Published : 1238
No. of Authors : 3111
  Journal Paper

Paper Title
Securing the Sensitive Files in Cloud From Eavesdrop

Abstract
Because of the progress of distributed computing, the information through the cloud servers is becoming quick i.e.; in view of presenting the speed, proficiency to the cloud. so multiple users are picking the cloud as their decision to oversee information. The information in the cloud is secured when authentication given at the section of adding information to the cloud ,yet at the section of retrieval, the cloud server don’t know who is retrieving the data if eaves dropping attack is occurred. It is because the virtualization and firewalls used by CSP don't safeguard owners’ data privacy .To prevent the data loss, unauthorized private data access, one should have to provide the secured retrieval door for the cloud. In this case, to guarantee data insurance, fragile cloud information must be encoded before outsourcing to the business open cloud, which makes appropriate information utilization. The client needs to demonstrate his personality at whatever point the touchy information is found on the cloud. When the sensitive information is needed to recover, the cloud client needs to demonstrate his authentication to decode the data in the cloud. At first the data documents of the user are stored after encrypting using AES algorithm. When some ones computer file is private, i.e., the information that is personal, in ways will be guaranteed inside in a great manner. The consumer must supply the dynamic secret key that is produced and delivered to prove the identity. If the bottom line is matched up the information in the file is decrypted and the authenticated user can access the sensitive data. Index Terms— Eavesdropping, multiple owners, Dynamic secret key, Cloud service provider( CSP)


Author - B.Monica Grace, R.Ramesh

| PDF |
Viewed - 36
| Published on 2017-02-16
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY