Client and Data Confidentiality in Cloud Computing Using Fragmentation Method
Thota Reshma Kishore1, D.Akhila Devi2, S.Prathyusha3, D.Bhagyasri4, Bhuma Naresh5
1Thota Reahma Kushiro, Electronics And Computers, K L University, Guntur District, Andhra Pradesh, India.
2D.Akhila Devi, Electronics And Computers, K L University, Guntur District, Andhra Pradesh, India.
3S.Prathyusha, Electronics And Computers, K L University, Guntur District, Andhra Pradesh, India.
4D.Bhagyasri, Electronics And Computers, K L University, Guntur District, Andhra Pradesh, India.
5D.Bhagyasri, Electronics And Computers, K L University, Guntur District, Andhra Pradesh, India.
Manuscript received on April 03, 2013. | Revised Manuscript received on April 29, 2013. | Manuscript published on May 05, 2013. | PP: 337-339 | Volume-3, Issue-2, May 2013. | Retrieval Number: B1537053213/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In Today’s world cloud computing has occupied a prior place in the emerging technologies cause of its ease of access at lower costs. According Moore’s Law computer technology, through transistors and integrated circuits, along with digital electronic devices, will double every 18 months to two years. It’s a steep curve that began in the 1960s and is expected to continue until about 2020. It is anticipated in the coming years there will be more than one trillion cloud-ready devices, allowing users to work more quickly, conveniently, and at lower cost…this phenomenon presents us with a great risk of data theft and privacy issues. especially for those dealing with sensitive information, Questions that arise include what methods are available and how can that information remain secure to ensure client protection and confidentiality? .Among these Confidentiality privacy is the main reason that many companies and also individuals to some extent are avoiding the cloud ready devices, which also needs be addressed. For this purpose we are proposing a new model that enables convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This report analyses the challenges posed by cloud computing and the standardization work being done by various standards development organizations (SDOs) to minimize privacy risks in the cloud, including the role of privacy-enhancing technologies (PETs).here the new model to provide confidentiality using fragmentation method The method supports minimal encryption to minimize the computations overhead due to encryption.
Keywords: Cloud computing, Data confidentiality, Fragmentation, Data outsourcing, Privacy preserving.