This paper is published in Volume-4, Issue-2, 2018
Area
Cloud Security
Author
K. Dhanabakiyam
Co-authors
V. Divya , R. Maheswari, E. Sathiya Jothi , M. S Vijay Kumar
Org/Univ
Tejaa Shakthi Institute of Technology for women, Coimbatore, Tamil Nadu, India
Pub. Date
21 March, 2018
Paper ID
V4I2-1221
Publisher
Keywords
Data Stream, Multiple Keys, Public Verifiability, AES

Citationsacebook

IEEE
K. Dhanabakiyam , V. Divya , R. Maheswari, E. Sathiya Jothi , M. S Vijay Kumar . Enhanced Protection Over Data Streams under Multiple Keys in Cloud, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
K. Dhanabakiyam , V. Divya , R. Maheswari, E. Sathiya Jothi , M. S Vijay Kumar (2018). Enhanced Protection Over Data Streams under Multiple Keys in Cloud. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.

MLA
K. Dhanabakiyam , V. Divya , R. Maheswari, E. Sathiya Jothi , M. S Vijay Kumar . "Enhanced Protection Over Data Streams under Multiple Keys in Cloud." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.

Abstract

Upload the data streams to the cloud servers for the product evaluation; it is an important to many popular stream applications. And it is applying to many organizations. But at the same time, it is difficult to verify the result on the cloud computation, it leads to the issues of trust. Since the outsourced data streams are retrieved from various resources. In the existing system, each originator has a unique secret key. But when the multiple users tend to download the same file, it leads to some misconceptions. Hence, it extends to the multiple-key settings, whereas it doesn’t use any specific algorithm for encryption. In this paper, we mainly focus on the security. We propose an Advance Encryption Standard (AES) for the encryption. And also we implement an extra proxy server for the data reliability. Hence, in this project, we introduce the novel homomorphic verifying tag technique. For verify the inner product evaluation on the multiple dynamic data streams and then it extends to the matrix product verification. We use the random oracle access model.
Paper PDF