Abstract

In our day to day life we are generating a lots of data, which has become a major problem to store those data in a local server or personal computer. In order to resolve this problem, we need many numbers of servers and networking which are more expensive of buying and which creates more complexity. To resolve this problem we are using the method called cloud computing, it provides IT resources as the service to the user over the internet and can use it on the basis of pay per usage. As it is a researching area of computer network technology, many of huge companies are providing the cloud services. According to the financial perspective, migration of data to the cloud remains trending now a days, but there are several other aspects that must be taken in to consideration before it is decided to do, among them the most important problem is security. Cloud computing security refers to the set of polices, technologies and controls over, applications and infrastructure of cloud computing. This paper tells us how to establish the data confidentiality, availability, security and integrity of shared data in multi cloud environment. So while providing the storage for cloud storage the providers repeatedly make sure the data confidentiality, by encrypting the content of the file by using encryption algorithm and certify the data integrity by cross checking the hash values of the file. Despite, when the cloud storage service fails, the availability of the user data cannot be certified and the cloud sharing function of the user data also cannot be supported. To overcome this users have to give full trust in existing schemes to the provider of the cloud storage service. If the provider system get hacked or becomes untrustworthy, the confidentiality of the user data will be exposed. In order to solve these problems, this paper proposes a scheme for securely storing and sharing data based on the improved proxy re-encryption algorithm in the multi cloud environment. Here the multi cloud storage is constructed to counter the failure of any single cloud, the symmetric encryption algorithm is used to encrypt the user files. The encryption key is accurately distributed with the Shamir's threshold secret sharing scheme by the general RSA algorithm. Finally the improved proxy re-encryption algorithm is advantage to support the sharing of encrypted user data via clouds. The pattern of the design is performed in the java development environment and is assessed under the assumed multi cloud environment. The experimental results of this design shows that, the time cost of the Shamir's secret partitioning process and symmetric encryption process about be negligible if the key size is greater than the 384 bytes, and the improved proxy re-encryption process takes about 1.5 seconds in an average.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call