Article Details

An Analysis upon Various Security Methods for Identification of Data in Cloud Computing Environment: A Case Study of Predicate Based Encryption | Original Article

Anita Soni*, Kalpana ., in Journal of Advances in Science and Technology | Science & Technology


Cloud computing has turned into a standout amongst the most critical data security issue lately. That is because of the breathtakingly developing applications and obliged services of cloud computing. Notwithstanding, with a specific end goal to securely use and revel in the profit of cloud computing through wired/wireless networking, sufficient confirmation of data security, for example, classified ness, verification, non repudiation, and respectability is the most basic component for reception. Data that was once housed under the security realm of the service client has now been put under the insurance of the service provider. Clients have lost control over the security of their data. Never again is our data held under our own particular watchful eyes. This study demonstrates how Predicate Based Encryption (PBE) could be leveraged inside the Cloud to secure data. Five situations for utilizing Predicate Based Encryption inside the Cloud are introduced. These situations vary regarding mode of operation, predicate situation, and responsibility for Key Authority. In a perfect world, a privacy-saving database-in-the-cloud environment might permit a database possessor to outsource its encrypted database to a cloud server. The possessor might hold control over what records might be questioned and by whom, by giving each one commissioned client a hunt token and a decryption key. A client might then present this token to cloud server who might utilize it to find encrypted matching records, while taking in nothing else. A client could then utilization its possessor issued decryption key to take in the actual matching records.