Manuscript Title:

ENHANCED SECURITY AND PRIVACY PRESERVATION ALGORITHMS FOR CLOUD COMPUTING ENVIRONMENTS

Author:

K. MAHESH RAJ, D. THIYAGARAJAN, M. ASHOK

DOI Number:

DOI:10.5281/zenodo.14498722

Published : 2024-12-10

About the author(s)

1. K. MAHESH RAJ - Research Scholar, Computer Science and Engineering, Malla Reddy University, Hyderabad, India.
2. D. THIYAGARAJAN - Associate Professor, Artificial Intelligence and Machine LearningMalla Reddy University, Hyderabad, India.
3. M. ASHOK - Professor and Principal, Computer Science and Engineering, MRCE, Hyderabad, India.

Full Text : PDF

Abstract

With its scalable and cost-effective solutions, cloud computing has taken center stage in modern data management. Nevertheless, this fast growth of cloud services comes with urgent data security and privacyrelated dilemmas. In this paper, three novel algorithms are proposed to deal with the above-mentioned problem in the cloud environment, namely Improved Privacy- Preserved Data Security Approach (IPPDSA), Multi-Authority Scheme Based Privacy Preserving Algorithm (MASPPA) and Anonymous AccessBased Privacy Preserving Algorithm (AABPPA). Key management efficiency is advocated by the new IPPDSA with small key generating times which are expected to be short enough to run in steadily update phase. The MASPPA uses the multi-authority attribute-based encryption to realize fine-grained access control, and the encryption times are commensurate to its extensive security guarantee. The second is the AABPPA which is appropriate for situations where user anonymity is required, however is slower in computation times than the AABM but does really well in preserving privacy. This section presents the performance metrics, specifically the time taken for key generation, encryption, and decryption and collectively analyse the advantages and disadvantages of each algorithm. Our results show that the algorithms proposed, when compared to FT-RSA, provide very high security and privacy for applications ranging from low to high computational demands. We recommend additional optimizations to make them more effective in real-world applications.


Keywords

Cloud Security, Privacy, Anonymous Access, Multi-Authority.