Efficient and Enhanced Data Encryption In Cloud Computing

Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand. However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this project, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment. The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may not be trusted.


I. INTRODUCTION
Big data is a concept which is used to describe a huge amount of both structured and unstructured data that is so large. It becomes very difficult to process such data using traditional database models like (DBMS, RDMS) and software methodologies. A most important concern is that, if the volume of data is too big or it moves too fast or it exceeds current processing capacity, then it becomes a risky one.
Big data has the ability to provide, improve operations and it makes process faster, and take more intelligent decisions for the organizations. It gets origin from Web search companies who had the problem of querying very large distributed aggregations of loosely-structured data. But, the challenge of keeping those huge amounts of structured and unstructured data leads to the change, as a result of increase in number of data sharing devices. When big data is effectively captured and analyzed efficiently, it can lead to efficiency improvements, increased sales, lower costs, better customer service, and improved products service. Companies are able to gain a more complete understanding of their business, and their customers.
Cloud computing is a technology to access the resources available in the servers through Internet.
Cloud computing technology becomes popular in the recent years due to its several advantages over traditional methods, like flexibility, scalability, agility, elasticity, energy efficiency, transparency, and cost saving. Cloud resources are shared resources which can be accessed by any one, anytime and anywhere. It is accessible through any devices like mobile, desktops, laptops, tablets etc… The resources and information are provided for the users based on demand services.
It allows the users to pay only for the resources and workloads they use.

II. LITERATURE SURVEY
Cloud is nothing but a server and a number of servers interconnected through it. Cloud providers are the one who own large data centres with massive computation and storage capacities. They sell these capacities on-demand to the cloud users who can be software, service, or content providers for the users over the internet. In the recent years the major cloud providers are Google, Microsoft, and Amazon etc.
Traditional Cryptography encryption techniques such as identity based encryption, public key encryption etc, are used to provide security to the data from third party hackers. By employing traditional mechanisms it is not possible to protect some confidential sensitive information being leaked to the public and also to the cloud server. This is because traditional mechanisms do not consider the anonymity of a cipher text sender or receiver. Accordingly anyone with the knowledge of obtaining a cipher text can obtain the public key of the text, which means hacker will know the owner of the text.
Public key encryption (PKE) is the more frequently used encryption mechanism which allows a data sender to encrypt data by using the public key of the receiver such that, only the valid recipient can access gain to those data. Public key type of encryption does not support anonymity, update of cipher text receiver which is required to maintain consistency and efficiency.
There are some traditional mechanisms such as anonymous IBE which consider anonymity of cipher text sender and receiver, but it does not support the update of cipher text recipients. Traditional encryption mechanisms are applicable only for small amount of data. If the encrypted data is large, encryption and de-encryption process might be a time consuming and a costlier one.

III. PROBLEM DEFINITION
The need of secure big data storage service is more desirable than ever to date. The basic requirement of the service is to guarantee the confidentiality of the data. However, the anonymity of the service clients, one of the most essential aspects of privacy, should be considered simultaneously. Moreover, the service also should provide practical and fine-grained encrypted data sharing such that a data owner is allowed to share a cipher text of data among others under some specified conditions. This paper, for the first time, proposes a privacy-preserving cipher text multisharing mechanism to achieve the above properties. It Before logging to the cloud, user has to register their details like user id, password. This registration will used to avoid anonymous users. By this user will get a user name and password for their account. Every user must be register then only they can log in the cloud.

Log in:
In this module user enter their user name and password what they registered. After log in to cloud user can manage their cloud data.

Upload File:
In this module user can upload the file to cloud, for each files uploaded, random private key is generated and these private keys will encrypt the uploaded file and gets stored in cloud. User can view the encrypted file that is stored in cloud. User can select the available Cloud Service Provider and store the data in cloud.

View Uploaded File
In this module user can view the original uploaded file by specifying public key given for specific uploaded file by Cloud Service Provider. Once again user has to enter Private Key given for specific uploaded file. Here double decryption is done to get the original data. If a hacker gets the access to uploaded file, only encrypted data will be shown to him, instead of original data.
Cloud Service Provider Module 1. Log in: In this module Cloud Service Provider enter their user name and password. After log in to cloud, for each user files uploaded, random public key is generated and these public keys will encrypt the uploaded file and gets stored in cloud.

View Encrypted File
Cloud Service Provider can view the encrypted file that is stored in cloud. Cloud Service Provider can view the available user files that are allotted to them.
He can't view other Cloud Service Provider files.

V. Conclusion and Future Work
Cloud computing is changing the way IT, departments buy IT Businesses have a range of paths to the cloud, including infrastructure, platforms and applications that are available from cloud providers as online services.
Many people may be confused by the range of offerings and the terminology used to describe them and will be unsure of the risk and benefits. Security is a major requirement in cloud computing when we talk about data storage. Information needs protection, there are many Security Threats, and different types of security risks need to be discussed. In order to improving the security and protection and building the Secure Cloud, There are number of existing techniques used to implement security.
In this paper, we put forward an efficient record storage