Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing

Authors

  • Sharma I Dept. of Computer Science Engg., Rayat and Bahra Institute of Engg., Sahuaran, PTU Punjab , India
  • kaur M Dept. of Computer Science Engg., Rayat and Bahra Institute of Engg., Sahuaran, PTU Punjab , India

Keywords:

Data Security, Cloud, Computing, Privacy, NTRU, NAIVE

Abstract

Cloud computing nowadays is dealing with most of security issues and privacy issues, no matter how strong security we use but achieving the 100% security will always a tough notch. However this research deals with area of cloud computing in building the trust level of cloud brokers among the general public or its distributers and buyers. The trust level is achieved by following a novel idea of checking the data manipulation in uploaded content. The SAAS cloud network in general is always secured with encryption so in this part for security NTRU is been implemented. Further this method describes the naive bayes string pattern matching algorithm. The data which is uploaded in server is auto synchronizing for back up onto another server which is a hidden database server. The user doesn’t know that his/her data is kept in this server also whenever the query for download is been generated to download the server the existing data in server is cross verified with hidden database to check the manipulation if any which is accommodated using Naïve Bayes String Search Algorithm. If no data manipulation is been occurred it defines the superiority and trustworthiness of cloud storage among the public and cloud buyers.

 

References

Bhadauria, R., & Sanyal, S. (2012). Survey on security issues in cloud computing and associated mitigation techniques. arXiv preprint arXiv:1204.0764.

Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011). A survey on security issues in cloud computing. arXiv preprint arXiv:1109.5388.

Behl, A. (2011, December). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Information and Communication Technologies (WICT), 2011 World Congress on (pp. 217-222). IEEE.

Dan Boneh, Eu-Jin Goh, and KobbiNissim. Evaluating 2-DNF formulas on ciphertexts. In Theory of Cryptography Conference, TCC'2005, volume 3378 of Lecture Notes in Computer Science, pages 325-341. Springer, 2005.

Dhage, S. N., & Meshram, B. B. (2012). Intrusion detection system in cloud computing environment. International Journal of Cloud Computing, 1(2), 261-282

Jansen, W. A. (2011, January).Cloud hooks: Security and privacy issues in cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-10). IEEE.

Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. NIST special publication, 800, 144.

Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud?. Journal of Information Technology & Politics, 5(3), 269-283.

Julien Bringe and al. An Application of the Goldwasser-MicaliCryptosystem to Biometric Authentication, Springer-Verlag, 2007.

Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., & Lee, B. S. (2011, July). TrustCloud: A framework for accountability and trust in cloud computing. In Services (SERVICES), 2011 IEEE World Congress on (pp. 584-588). IEEE

Kolodner, E. K., Tal, S., Kyriazis, D., Naor, D., Allalouf, M., Bonelli, L & Wolfsthal, Y. (2011, November). A cloud environment for data-intensive storage services. In Cloud computing technology and science (CloudCom), 2011 IEEE third international conference on (pp. 357-366). IEEE.

Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance. " O'Reilly Media, Inc.".

Michener, W. K., & Jones, M. B. (2012). Ecoinformatics: supporting ecology as a data-intensive science. Trends in ecology & evolution, 27(2), 85-93.

Mishra, R., Dash, S. K., Mishra, D. P., & Tripathy, A. (2011, April). A privacy preserving repository for securing data across the cloud. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Vol. 5, pp. 6-10). IEEE.

Downloads

Published

2015-05-30

How to Cite

[1]
I. Sharma and M. kaur, “Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 3, no. 5, pp. 393–397, May 2015.

Issue

Section

Research Article