Open Access   Article Go Back

Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing

Indu Sharma1 , Mandeep Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 393-397, May-2015

Online published on May 30, 2015

Copyright © Indu Sharma , Mandeep Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Indu Sharma , Mandeep Kaur, “Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.393-397, 2015.

MLA Style Citation: Indu Sharma , Mandeep Kaur "Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing." International Journal of Computer Sciences and Engineering 3.5 (2015): 393-397.

APA Style Citation: Indu Sharma , Mandeep Kaur, (2015). Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing. International Journal of Computer Sciences and Engineering, 3(5), 393-397.

BibTex Style Citation:
@article{Sharma_2015,
author = {Indu Sharma , Mandeep Kaur},
title = {Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {393-397},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=538},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=538
TI - Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Indu Sharma , Mandeep Kaur
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 393-397
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2475 2352 downloads 2408 downloads
  
  
           

Abstract

Cloud computing nowadays is dealing with most of security issues and privacy issues, no matter how strong security we use but achieving the 100% security will always a tough notch. However this research deals with area of cloud computing in building the trust level of cloud brokers among the general public or its distributers and buyers. The trust level is achieved by following a novel idea of checking the data manipulation in uploaded content. The SAAS cloud network in general is always secured with encryption so in this part for security NTRU is been implemented. Further this method describes the naive bayes string pattern matching algorithm. The data which is uploaded in server is auto synchronizing for back up onto another server which is a hidden database server. The user doesn’t know that his/her data is kept in this server also whenever the query for download is been generated to download the server the existing data in server is cross verified with hidden database to check the manipulation if any which is accommodated using Naïve Bayes String Search Algorithm. If no data manipulation is been occurred it defines the superiority and trustworthiness of cloud storage among the public and cloud buyers.

Key-Words / Index Term

Data Security, Cloud, Computing, Privacy, NTRU, NAIVE

References

[1] Bhadauria, R., & Sanyal, S. (2012). Survey on security issues in cloud computing and associated mitigation techniques. arXiv preprint arXiv:1204.0764.
[2] Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011). A survey on security issues in cloud computing. arXiv preprint arXiv:1109.5388.
[3] Behl, A. (2011, December). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Information and Communication Technologies (WICT), 2011 World Congress on (pp. 217-222). IEEE.
[4] Dan Boneh, Eu-Jin Goh, and KobbiNissim. Evaluating 2-DNF formulas on ciphertexts. In Theory of Cryptography Conference, TCC'2005, volume 3378 of Lecture Notes in Computer Science, pages 325-341. Springer, 2005.
[5] Dhage, S. N., & Meshram, B. B. (2012). Intrusion detection system in cloud computing environment. International Journal of Cloud Computing, 1(2), 261-282
[6] Jansen, W. A. (2011, January).Cloud hooks: Security and privacy issues in cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on (pp. 1-10). IEEE.
[7] Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. NIST special publication, 800, 144.
[8] Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud?. Journal of Information Technology & Politics, 5(3), 269-283.
[9] Julien Bringe and al. An Application of the Goldwasser-MicaliCryptosystem to Biometric Authentication, Springer-Verlag, 2007.
[10] Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., & Lee, B. S. (2011, July). TrustCloud: A framework for accountability and trust in cloud computing. In Services (SERVICES), 2011 IEEE World Congress on (pp. 584-588). IEEE
[11] Kolodner, E. K., Tal, S., Kyriazis, D., Naor, D., Allalouf, M., Bonelli, L & Wolfsthal, Y. (2011, November). A cloud environment for data-intensive storage services. In Cloud computing technology and science (CloudCom), 2011 IEEE third international conference on (pp. 357-366). IEEE.
[12] Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance. " O'Reilly Media, Inc.".
[13] Michener, W. K., & Jones, M. B. (2012). Ecoinformatics: supporting ecology as a data-intensive science. Trends in ecology & evolution, 27(2), 85-93.
[14] Mishra, R., Dash, S. K., Mishra, D. P., & Tripathy, A. (2011, April). A privacy preserving repository for securing data across the cloud. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Vol. 5, pp. 6-10). IEEE.