Megha Patidar

Work place: SIMS, Department of computer science, Indore, 452009, India

E-mail: Jia.meg@gmail.com

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Systems Architecture, Network Architecture, Network Security

Biography

Megha Patidar received her M. tech degree in information technology with a silver medal. She has many years of research experience in the field of distributed system, computer architecture, network and cloud computing. She has published many international and national level papers.

Author Articles
Performance Evaluation of TPA-HE Based Fine Grained Data Access for Cloud Computing

By Pawan Kumar Parmar Megha Patidar Mayank Kumar Sharma

DOI: https://doi.org/10.5815/ijmecs.2014.10.01, Pub. Date: 8 Oct. 2014

As the software technology evolves the focus of users are shifting form devices for data or information. This transformation requires reliable and scalable computing paradigms which satisfy the users processing and storage requirements. Service based, distributed, grid and web 2.0 are some of the most famous computing technologies. Conversions are occurring towards less managements and maintenance issues and despite of that the usage experience should be increased. But there are some security concerns like security, access control, privacy & isolation based trusted service delivery raises due to the data in an outsourced environment. Thus, several policies are created to define its boundaries. Also the type of user accessing the data and the service provided by the cloud needs to be verified. Thus the uses trust over the system can go down if the interoperability and security of services are satisfactory. To providing confidentiality to users data encryption is the traditional options which require decryption for reading or retrieving the data. But in outsourced environment the user is frequently accessing its data which may increase the overhead of performing such frequent encryption and then decryptions. Also for performing any operations the data need to be decrypted. It is something treating as a complex usage boundary. Thus, Homomorphic encryption is used to deal with such situations. This paper proposes a novel Third Party and Homomorphic Encryption (TPA-HE) based mechanism for secure computing. In this third party auditor and service provider is used for authentication and authorization of services & user profiles. It has three basic entities TPA, Cloud Service Provider, Encryption & Monitoring service to regularly analyze the security breaches in access & data transfer mechanism. To prove the effectiveness of suggested approach some of the results are taken which are better than the existing mechanism.

[...] Read more.
Other Articles