Journal article Open Access

Protecting Data Privacy in Cloud

Masarath Begum; Mohammed Abdul Waheed

MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="">
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Diffie-Hellman key Exchange, LFSR, Correlation</subfield>
  <controlfield tag="005">20211023134843.0</controlfield>
  <controlfield tag="001">5593933</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Associate Professor VTU CPGS,  Kalaburgi, Visvesvaraya Tecnological University Belagavi, Karnataka  India</subfield>
    <subfield code="a">Mohammed Abdul Waheed</subfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Publisher</subfield>
    <subfield code="4">spn</subfield>
    <subfield code="a">Blue Eyes Intelligence Engineering  &amp; Sciences Publication(BEIESP)</subfield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">723489</subfield>
    <subfield code="z">md5:b2ab0dbd0ff412f583a9325be333d832</subfield>
    <subfield code="u"></subfield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2020-02-29</subfield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o"></subfield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">3601-3604</subfield>
    <subfield code="n">3</subfield>
    <subfield code="p">International Journal of Engineering and Advanced Technology (IJEAT)</subfield>
    <subfield code="v">9</subfield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Assistant Professor GNDEC, Bidar,  Visvesvaraya Tecnological University Belagavi,Karnataka India</subfield>
    <subfield code="a">Masarath Begum</subfield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Protecting Data Privacy in Cloud</subfield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u"></subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2"></subfield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">ISSN</subfield>
    <subfield code="0">(issn)2249-8958</subfield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">Retrieval Number</subfield>
    <subfield code="0">(handle)C6096029320 /2020©BEIESP</subfield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;Cloud is now widely used for the remote storage of data; it&amp;rsquo;s an On-demand device and computer resource configuration process. This allows users to avoid locally saving and storing data. Remote data sharing is an inexpensive and effective way to share cloud users community resources. Diffie Hellman used the previous approach to protect multi-owner cloud sharing for distributed groups. In the existing system, there is a community signature shared among all group members that contributes to the middle attack. The program suggested using the LFSR-dependent correlation method, which primarily used handshake protocol to safely exchange community signature to detect the attack, to detect an attack. If the calculated value exceeds one (value&amp;gt;1), the community&amp;#39;s public key is changed to avoid abuse.&lt;/p&gt;</subfield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">issn</subfield>
    <subfield code="i">isCitedBy</subfield>
    <subfield code="a">2249-8958</subfield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.35940/ijeat.C6096.029320</subfield>
    <subfield code="2">doi</subfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
Views 39
Downloads 11
Data volume 8.0 MB
Unique views 36
Unique downloads 11


Cite as