Protecting Data Privacy in Cloud
Masarath Begum1, Mohammed Abdul Waheed2

1Masarath Begum1, Assistant Professor GNDEC, Bidar, Visvesvaraya Tecnological University Belagavi,Karnataka India
2Dr.Mohammed Abdul Waheed, Associate Professor VTU CPGS, Kalaburgi, Visvesvaraya Tecnological University Belagavi, Karnataka India.
Manuscript received on January 23, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 30, 2020. | PP: 3601-3604 | Volume-9 Issue-3, February 2020. | Retrieval Number: C6096029320 /2020©BEIESP | DOI: 10.35940/ijeat.C6096.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud is now widely used for the remote storage of data; it’s an On-demand device and computer resource configuration process. This allows users to avoid locally saving and storing data. Remote data sharing is an inexpensive and effective way to share cloud users community resources. DiffieHellman used the previous approach to protect multi-owner cloud sharing for distributed groups. In the existing system, there is a community signature shared among all group members that contributes to the middle attack. The program suggested using the LFSR-dependent correlation method, which primarily used handshake protocol to safely exchange community signature to detect the attack, to detect an attack. If the calculated value exceeds one (value>1), the community’s public key is changed to avoid abuse.
Keywords: Diffie-Hellman key Exchange, LFSR, Correlation.