Data Security in Green Cloud
Data Security in Green Cloud
ABSTRACT
• Green computing is defined as the study and practice of designing ,
manufacturing, using, and disposing of computers, servers, and associated
subsystems-such as monitors, printers, storage devices, and networking and
communications systems-efficiently and effectively with minimal or no impact on
the environment."
• Cloud software service is a modality for providing computer facilities and
deploying software via the Internet. The concept combines Cloud Computing and
Software-as-a-Service (SaaS).
• Cloud computing represents a contextual shift in how computers are provisioned
and accessed.
• There are many different examples of cloud software service, and this paper seeks
to combine the salient elements into a composite picture of the subject matter.
OBJECTIVE
AIM
• Keyword Search over Encrypted Data. The encrypted data index based on the
Elliptic Curve Digital Signature
Algorithm(ECDSA)allowsausertosearchovertheoutsourced encrypted data.
The major part of the project development sector considers and fully
survey all the required needs for developing the project. For every project
Literature survey is the most important sector in software development process.
Before developing the tools and the associated designing it is necessary to
determine and survey the time factor, resource requirement, man power,
economy, and company strength. Once these things are satisfied and fully
surveyed, then the next step is to determine about the software specifications in
the respective system such as what type of operating system the project would
require, and what are all the necessary software are needed to proceed with the
next step such as developing the tools, and the associated operations.
Identity-Based Encryption (IBE) which simplifies the public key and certificate
management at Public Key Infrastructure (PKI) is an important alternative to
public key encryption. However, one of the main efficiency drawbacks of IBE is
the overhead computation at Private Key Generator (PKG) during user
revocation. Efficient revocation has been well studied in traditional PKI setting,
but the cumbersome management of certificates is precisely the burden that IBE
strives to alleviate. In this paper, aiming at tackling the critical issue of identity
revocation, we introduce outsourcing computation into IBE for the first time and
propose a revocable IBE scheme in the server-aided setting. Our scheme offloads
most of the key generation related operations during key-issuing and key-update
processes to a Key Update Cloud Service Provider, leaving only a constant
number of simple operations for PKG and users to perform locally. This goal is
achieved by utilizing a novel collusion-resistant technique: we employ a hybrid
private key for each user, in which an AND gate is involved to connect and
bound the identity component and the time component. Furthermore, we propose
another construction which is provable secure under the recently formulized
Refereed Delegation of Computation model. Finally, we provide extensive
experimental results to demonstrate the efficiency of our proposed construction.
Existing System
• In slight contrast, it is used and own by an organization internally, anyone
within the organization can access the data, services and web application
except for outside, reaffirmed the above assertions and added that, a
private cloud provides the upmost degree of control over performance,
trustworthiness and security.