Proposing PDM Model for Securing Data Storage on Cloud Servers
Amit Kumar Chaturvedi1, Meetendra Singh Chahar2, Kalpana Sharma3

1Dr. Amit Kumar Chaturvedi*, CS Dept, Engineering College, Ajmer, Rajasthan, India.
2Meetendra Singh Chhahar, Ph.D. Scholar, CS Dept., Bhagwant Univ., Ajmer , Raj. India.
3Dr. Kalpana Sharma, CS Dept., Bhagwant Univ. Ajmer, Raj., India.

Manuscript received on February 01, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 30, 2020. | PP: 789-793 | Volume-9 Issue-3, February, 2020. | Retrieval Number: C5343029320/2020©BEIESP | DOI: 10.35940/ijeat.C5343.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Clouds are the group of resources like data storage, processors, security tools, etc. that are shared by the big resource providers like Amazon, Google, Yahoo etc. and the users of these resources. There is the requirement of privacy policy when we work in such a shared, unknown, untrusted, and pay per use environment. Computing industry is now shifted their orientation from arranging first the resources to developing new applications or application of new ideas. Because in the cloud computing world , every resource required for developing and executing an idea or application is available or pay per use basis. But even though everything is available with scalability or these resources, the data of the business transaction with authenticity is prime for all either business organization or customer. As we know that user’s and transaction data is very important and unauthorized access is illegal and harmful for everyone. Because worldwide the use of online services is increasing exponentially and the use of cloud computing for these solutions is also increasing. We have considered this problem for our research work and in this paper, we are proposing a PDM privacy preserving model for more securing the cloud data.
Keywords: Perturbation, Data Security, encryption, decryption, cryptography.