Outsourcing data storage increases the attack surface area. 1.When data is distributed it is stored at more locations increasing the risk of unauthorised physical
As shown in figure 3 the Cloud Service Provider maintain Data cloud .data cloud is key value data storage system hence unique key is assign to each piece of data ,cloud service
There are various problems existing in cloud storage system, the cloud storage system poses new challenges in data security, reliability, and management and there is no provision of
The searchable encryption technique plays an important role in cloud data storage, where a user can submit a search query to a storage server (e.g., cloud server),,
‘Secure and data de-duplicated multi-cloud storage system (SDDMCSS)’, data blocks stored on multiple cloud servers, so single server data blocks cannot identify original
A public protagonist, sort of a third party audit providing professional information audit services or a information user outside the cluster aspiring to
We have designed a robust protection mechanism to secure the decryption key and decrypted data during query processing in cloud database services.. In our system, the decryption key is
coincidentally we get ANKH. Here the Ankh is written in the long form. Here we see the most common usage of the Ankh – Here is the Symbol, the N – water ripple and the KH – Placenta?.
In ordinary data sharing, a data sender, say Alice, first encrypts the sharing data under the identity of a data receiver, say Bob, and next uploads the ciphertext to the cloud server.
In our experiments, initially start the three servers like Cloud server system, Key generator system (The first factor is his/her secret key stored in the computer) ,
 The key design factors for a cloud-based secure storage system include: server-side logic being required on the cloud provider end; fine-grained data access;