Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing
Keywords:
Data Security, Cloud, Computing, Privacy, NTRU, NAIVEAbstract
Cloud computing nowadays is dealing with most of security issues and privacy issues, no matter how strong security we use but achieving the 100% security will always a tough notch. However this research deals with area of cloud computing in building the trust level of cloud brokers among the general public or its distributers and buyers. The trust level is achieved by following a novel idea of checking the data manipulation in uploaded content. The SAAS cloud network in general is always secured with encryption so in this part for security NTRU is been implemented. Further this method describes the naive bayes string pattern matching algorithm. The data which is uploaded in server is auto synchronizing for back up onto another server which is a hidden database server. The user doesn’t know that his/her data is kept in this server also whenever the query for download is been generated to download the server the existing data in server is cross verified with hidden database to check the manipulation if any which is accommodated using Naïve Bayes String Search Algorithm. If no data manipulation is been occurred it defines the superiority and trustworthiness of cloud storage among the public and cloud buyers.
References
Bhadauria, R., & Sanyal, S. (2012). Survey on security issues in cloud computing and associated mitigation techniques. arXiv preprint arXiv:1204.0764.
Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011). A survey on security issues in cloud computing. arXiv preprint arXiv:1109.5388.
Behl, A. (2011, December). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Information and Communication Technologies (WICT), 2011 World Congress on (pp. 217-222). IEEE.
Dan Boneh, Eu-Jin Goh, and KobbiNissim. Evaluating 2-DNF formulas on ciphertexts. In Theory of Cryptography Conference, TCC'2005, volume 3378 of Lecture Notes in Computer Science, pages 325-341. Springer, 2005.
Dhage, S. N., & Meshram, B. B. (2012). Intrusion detection system in cloud computing environment. International Journal of Cloud Computing, 1(2), 261-282
Jansen, W. A. (2011, January).Cloud hooks: Security and privacy issues in cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-10). IEEE.
Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. NIST special publication, 800, 144.
Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud?. Journal of Information Technology & Politics, 5(3), 269-283.
Julien Bringe and al. An Application of the Goldwasser-MicaliCryptosystem to Biometric Authentication, Springer-Verlag, 2007.
Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., & Lee, B. S. (2011, July). TrustCloud: A framework for accountability and trust in cloud computing. In Services (SERVICES), 2011 IEEE World Congress on (pp. 584-588). IEEE
Kolodner, E. K., Tal, S., Kyriazis, D., Naor, D., Allalouf, M., Bonelli, L & Wolfsthal, Y. (2011, November). A cloud environment for data-intensive storage services. In Cloud computing technology and science (CloudCom), 2011 IEEE third international conference on (pp. 357-366). IEEE.
Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance. " O'Reilly Media, Inc.".
Michener, W. K., & Jones, M. B. (2012). Ecoinformatics: supporting ecology as a data-intensive science. Trends in ecology & evolution, 27(2), 85-93.
Mishra, R., Dash, S. K., Mishra, D. P., & Tripathy, A. (2011, April). A privacy preserving repository for securing data across the cloud. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Vol. 5, pp. 6-10). IEEE.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
