Secure and Efficient Privacy Preserving of data in cloud storage

  • Thatigotla Ashok Kumar Raju ,S.VijayaLakshmi

Abstract

Informal organizations Accounts are followed and recognized. 2. In the event that programmer assaults the Genuine client, at that point our permits the assailant to continue further until our framework catches all the significant data about the aggressor. We create Honeywords dependent on the client information gave and the first secret word is changed over into another arrangement and put away alongside the Honeywords. We convey Intermediate server, Shopping server for buy and Cloud server for keeping up client account subtleties. Aggressor who realizes the E mail record of unique client can without much of a stretch reset the secret word of the cloud server. Assailant is welcome to do assault right now, as to discover him out no problem at all. Presently assailant logins into the buy entry, where he is been followed accidentally and he is permitted to do buy. Server distinguishes the aggressor and sends the information to the Original proprietor and furthermore it hinders the assailant in any event, doing exchange from his unique record.

Published
2020-06-01
How to Cite
Thatigotla Ashok Kumar Raju ,S.VijayaLakshmi. (2020). Secure and Efficient Privacy Preserving of data in cloud storage. International Journal of Advanced Science and Technology, 29(7), 10654-10665. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/27261
Section
Articles