Encryption for Massive Data Storage in Cloud

  • Veeralakshmi Ponnuramu
  • Latha Tamilselvan
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 32)


Cloud is an evolving computing technology in which the services are provisioned dynamically through internet. The users’ data are stored in the remotely located servers that are maintained by cloud providers. The major security challenge in cloud is that the users cannot have direct control over the remotely stored data. To preserve the privacy of user’s data stored in the cloud, an efficient algorithm maintaining the confidentiality of data is proposed. We ensure that the data stored in the untrusted cloud server is confidential by developing a new data encryption algorithm. Unlike other encryption algorithms, our encryption algorithm needs lesser computation overhead. Encryption and decryption algorithms are developed in java and Remote Method Invocation (RMI) concepts are used for communication between client and server. Simulation environment is set up with the eucalyptus tool. This technique provides the data confidentiality with minimum computational overhead of the client.


Confidentiality Data encryption Cloud security Massive storage 


  1. 1.
    Pearson, S.: Taking account of privacy when designing cloud computing services. Proceedings of ICSE-Cloud’09, Vancouver (2009)Google Scholar
  2. 2.
    Jensen, M. et al.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109–116 (2009)Google Scholar
  3. 3.
    Wang, Q., Wang, Q., Li, J., Ren, K., Lou, W.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–858 (2011)CrossRefGoogle Scholar
  4. 4.
    Wei, L., Zhu, H., Cao, Z., Jia, W.: SecCloud: bridging secure storage and computation in cloud. In: ICDCS’10, pp. 52–61 (2010)Google Scholar
  5. 5.
    Juels. A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)Google Scholar
  6. 6.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609, ACM, New York, NY, USA (2007)Google Scholar
  7. 7.
    Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of 14th International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90–107 (2008)Google Scholar
  8. 8.
    Wang, C., Wang, Q., Ren, K., Lou, Q.: Ensuring data storage security in cloud computing. In: Proceedings of IWQoS’09, pp. 1–9 (2009)Google Scholar
  9. 9.
    Chang, E.C., Xu, J.: Remote integrity check with dishonest storage server. In: Proceedings of ESORICS’08, pp. 223–237, Springer, Berlin, Heidelberg (2008)Google Scholar
  10. 10.
    Wang, C., Wang, Q., Chow, S.S.M., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–374 (2013)CrossRefMathSciNetGoogle Scholar
  11. 11.
    Veeralakshmi, P., Tamilselvan, L.: Data integrity proof and secure computation in cloud computing. J. Comput. Sci. 8, 1987–1995 (2012)CrossRefGoogle Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.B.S. Abdur Rahman UniversityChennaiIndia

Personalised recommendations