Recent Advances in Electrical & Electronic Engineering

Author(s): Revati Raman Dewangan*, Sunita Soni and Ashish Mishal

DOI: 10.2174/0123520965280683240112085521

DownloadDownload PDF Flyer Cite As
An Approach of Privacy Preservation and Data Security in Cloud Computing for Secured Data Sharing

Page: [176 - 195] Pages: 20

  • * (Excluding Mailing and Handling)

Abstract

Introduction: Cloud computing has revolutionized how individuals and businesses engage with data and software, turning the internet into a powerful computing platform by centralizing resources. Despite its benefits, there's a challenge in safeguarding sensitive information stored externally. Cryptography faces threats, particularly chosen-ciphertext attacks aiming for secret keys or system information. While more common in public-key encryption, these attacks are less frequent in symmetrically coded systems. Security efforts include validating system resilience and continuous improvement, which are vital in countering evolving threats like adaptive chosen ciphertext attacks.

Methods: In the evaluation model, stringent measures emphasize robust encryption for system security. Despite the planning, no ciphertext attack guarantees success, necessitating adaptive security protocols. Adaptive attacks like CCA2 expose vulnerabilities, enabling attackers to manipulate ciphertexts persistently.

Results: We observe an average gain of 65% for the decryption algorithm. Efforts focus on strengthening security. The flawed 32-bit key-based encryption in the modified Cramer-Shoup structure undergoes remediation.

Conclusion: Conventional uncertainties validate resilience, emphasizing continuous evaluation and enhancement to counter evolving threats.

Keywords: Cramer-shoup, cloud security, privacy preservation, encryption/decryption, SaaS, Paas.