ISSN 2320 - 2602 Volume 6 No.11, November 2017 Ali Hasan Kamil et al., International Journal ofofAdvances in Computer Science and Science Technology, 6(11), November 2017, 25 - 29 International Journal Advances in Computer and Technology Available Online at http://www.warse.org/IJACST/static/pdf/file/ijacst016112017.pdf
Achieve Data Security In Cloud Computing Ali Hasan Kamil1, Qasim Abduljabbar Hamad2 1 Southern Technical University, Thi Qar– Iraq Ali.Gharaf88@Gmail.Com 2 University Of Sumer,Thi Qar– Iraq Qalrikabi@Gmail.Com ABSTRACT three users: creator, reader & writer. Creator receives a token from a trustee, i.e. organization after giving Security and privacy are very important issues in ID to the trustee. There was multiple of Key cloud computing, we propose a new Data sharing has Distribution Centre (KDC) which can be scattered. A never been easier with the advances of cloud creator gives their token to one or more KDC’s then computing, and an accurate analysis of the shared creator receives keys for encryption & decryption and data provides an array of benefits to both the society for signing from KDC’s. The message is encrypted and individuals. Data sharing with a large number of under an access policy which means it decides who participants must take into account several issues, can access the data stored in the cloud. Creator including efficiency, data integrity and privacy of the decides on a claim policy to prove her authenticity data owner. Ring signature is a promising candidate and signs the message under this claim. The cipher to construct an anonymous and authentic data sharing text is sent to the cloud. The cloud verifies the system. It allows a data owner to anonymously signature and stores the cipher text. When a reader authenticate his data which can be put into the cloud wants to read, the cloud sends cipher text. If the user for storage or analysis purpose. Yet the costly has attributes matching with access policy, it can certificate verification in the traditional public key decrypt and get back the original message. infrastructure (PKI) Setting becomes a bottleneck for this solution to be scalable. Identity-based (ID-based) Keywords:Cloud Computing, Security, Privacy,Encryption & Decryption. ring signature, which eliminates the process of certificate verification, can be used instead. There are algorithm to be implemented. This typical approach 1. INTRODUCTION is ready to with success check the correctness of Much of the information keep in clouds is very cloud information certainly. The potency of sensible, for example, social networks stored in exploitation this ancient approach on cloud medical records. Thus, important problems in cloud information is doubtful, the most reason is that the computing. In one hand, the user ought to testify aspect of cloud data is massive generally. itself before beginning any group action, and on the Downloading the entire cloud information to verify opposite hand, it must be confirm that the cloud information integrity can price or maybe waste user’s doesn't tamper with the information that's outsourced. amounts of computation and communication User privacy is additionally needed so the cloud or resources, particularly once data are corrupted within different users don't grasp the identity of the user. the cloud. Besides, several uses of cloud data don't The physical property of fast resource rating based essentially would like users to transfer the entire and risk of transformation. Cloud computing is cloud data to local devices. It’s as a result of cloud reworking the terribly nature of however businesses suppliers, appreciate Amazon, can give users use information technology. This paradigm to computation services directly on large-scale shifting the elementary facet that information square information that already existed within the cloud. measure being centralized or outsourced to the cloud. From users’ position together with each people and This mechanism to check integrity in public verifier IT enterprises are storing data remotely to the cloud without downloading the shared information from in a very versatile on-demand manner brings cloud, it is referred to the public audit. Information is appealing benefits, the global data to access the divided into many small blocks, in entire block location independence and personnel maintenance. should be independently signed by the owner and They entire data from the cloud to normal approach entire blocks alternatively a random combination, for checking data correctness is to retrieve and so integrity checking of all the retrieved data. If public verify information integrity by checking the verifier would like to expend the owner data from the correctness of signatures, in this data to check RSA 25