A Secure Data Sharing in an E-Commerce Site on a Cloud Based Environment

Abstract

Cloud computing provides services like infrastructure, software, applications and platform from a distant data centre to the client. Cloud computing has the advantage of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Privacy is always a concern in cloud computing because the service provider can access the data that is on the cloud at any time. Many cryptographic techniques are used to preserve data integrity from unauthorized users. The authenticity of the data in a insecure channel can be prevented using the cryptographic techniques and log generation scheme. This proposed system along with dynamic operation and public verifiability prevents adversary attack that takes place during the data sharing. This proposed system discusses the security issues involved in log management for a Secure Logging as a service and presents a design and implementation of a prototype delegating secure log manager. Main goal of a log manager in the third party auditor is to provide high bandwidth and low level inactivity. The sensitive information are kept in log files in cloud provider .The event that an attacker captures this server this system is likely to guarantee that the adversary will gain little or no information from the log files and to limit his ability to corrupt the log file. This system has implemented how to store secure log file in cloud and that file can be performed dynamic operation by the authorized users.

Authors and Affiliations

S. Lovely Jacinth Kirthana Kirthana. S, P. Durga Devi

Keywords

Related Articles

An Application Lean Six Sigma Tool for Reducing the Production Lead Time

Lean manufacturing is considered one of the quality improvement technique it increase the productivity and quality of product by reducing waste. Indian industries especially electronic sector have attempted to implement...

Transmission of Numeric Data and Voice Using Light Fidelity (LIFI) Technology

LIFI is a field of research which has to cover several miles in each and every phase to prove its efficacy as a potent technology that holds the strength to challenge the wide ranging technology today. Be it the radio s...

Implementation of Modified Booth Algorithm for Parallel MAC

This paper presents the methods required to implement a high speed and high performance parallel complex number multiplier. The designs are structured using Radix-4 Modified Booth Algorithm and Wallace tree. These two...

An Implementation of Fault Node Replacement algorithm for Wireless Sensor Network

In Wireless Sensor Network every Sensor node having a tendency to shut down ,due to computation power, Hardware Fail, Software Fail, environmental Condition and energy depletion. Fault Tolerance is a major problem in a...

Data Handling using Oracle Data Guard by the Transfer of Log Sequence.

Oracle Data Guard ensures high availability, data protection, and disaster recovery for enterprise data. Data Guard provides a comprehensive set of services that create, maintain, manage, and monitor one or more standby...

Download PDF file
  • EP ID EP22080
  • DOI -
  • Views 217
  • Downloads 4

How To Cite

S. Lovely Jacinth Kirthana Kirthana. S, P. Durga Devi (2016). A Secure Data Sharing in an E-Commerce Site on a Cloud Based Environment. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(5), -. https://europub.co.uk/articles/-A-22080