Abstract
In cloud computing, privacy is turn out to be the foremost difficulty. Therefore, this document is used to develop the cloud data defense by the help of an efficient data perturbation method. In the anticipated data perturbation method, the original data is recoverable whenever required. Additionally, the approach employs an enhanced cloud drops which is used to generate a noise among required mean and covariance in order get the actual data during retrieval. The privacy is preserved by means of Proxy Re-encryption algorithm on before the retrieval. During the outsourcing of data, data owner needs to ensure its security for the privacy purposes. Hereby, we have enabled a third party auditing to periodically check the perturbed data. This method is executed in the functioning platform of JAVA by way of ClouSim simulator.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have