A Framework to Secure cloud Data Server Information Using Data Obfuscation

Main Article Content

Juli Chaudhari
Jayesh Mevada


Cloud computing provide an high amount of virtual storage to the user. Cloud storage mainly help to small and medium scale industries to reduce their investment and maintenance of storage server. Users’ data are sent to the cloud is to be stored in the public cloud environment. Data stored in the cloud storage might combine with other users’ data. So, the issue about Security of cloud storage is ensured through confidentiality parameter. To ensure the confidentiality, the most common used technique is encryption. But encryption alone doesn’t give maximum protection to the data in the cloud storage. To have efficient cloud storage confidentiality, this paper uses encryption and obfuscation as two different techniques to protect the data in the cloud storage. Obfuscation is same like encryption. Obfuscation is a process which disguises illegal users by implementing a particular mathematical function or using programming techniques. Obfuscation can be applied to a numeric type of data. Applying encryption and obfuscation techniques on the cloud data will provide more protection against unauthorized usage. Confidentiality could be achieved with a combination of encryption and obfuscation. The proposed scheme, guarantees along with encryption, obfuscation technique is used to increase the confidentiality of data and also provide the right management .where the users data is secure on the server. We hope this paper will help quality analyst in pulling data, is secure to store in the cloud storage with more accuracy with higher speed and verify content by preserving privacy.


Download data is not yet available.


Metrics Loading ...

Article Details

How to Cite
Juli Chaudhari, and Jayesh Mevada. “A Framework to Secure Cloud Data Server Information Using Data Obfuscation”. Technix International Journal for Engineering Research, vol. 2, no. 8, Aug. 2015, pp. 136-40, https://tijer.org/index.php/tijer/article/view/90.
Research Articles


Dr.L.Arockiam and S.Monikandan ,”Efficient Cloud Storage Confidentiality to Ensure Data Security”2014 International conference on Computer communication and Information(2014 IEEE) ,jan.03-05,2014,coimbatore,India.

Arvind Narayanan and Vitaly Shamatikov , “Obfuscated Database and Group Privacy”, The University of Texas at Austin{arvind,shmat}@cs.utexas.edu,2013.

Christian Collberg,Clark Thomborson,Douglas Low,” A Taxonomy of Obfuscating Transformation ,” Department of computer science ,The University of Auckland, Private Bag 92019 Auckland,New Zealand. {collberg,cthombor,dlow001}@ cs.auckland.ac.nz”2012

Muhammad Hataba and Ahmed EI-Mahdy, “Cloud Protection by Obfuscation : Techniques and Metrics,”2012 IEEE Seventh International conference on P2P,Parallel,Grid,Cloud and Internet Computing,

Atiq ur Rehman,M.Hussain SZABIST Islamabad Pakistan,”Efficient Cloud Data Confidentiality for DaaS,” International Journal of Advanced Science and Technology Vol.35,october,2011.

Priyank Rajvanshi, Varun Singh Nagar, Priyanka Chawla , ”Data Protection in Cloud Computing” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-3, August 2013.

Sergey Vinogradov and Alexande Pastsyak,”Evaluation of Data Anonymization Tools” The Fourth International conference on Advances in Database,Knoweldge, and Data Application ,DBKDA 2012.

S N Dhage, B B Meshram,” Cloud Computing Environment” International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) – TCET,Mumbai, Insdia.

Why Add Data Masking to Your Best Practices for Securing Sensitive Data, Dataguise Inc., Whitepaper, 2009. www.dataguise.com

Data Solutions for Data Privacy, Direct Computer Resources Inc., Whitepaper, June 2010. www.datavantage.com

Shilpashree Srinivasamurthy and David Q. Liu “Survey on Cloud Computing Security” Department of Computer Science,Indiana University – Purdue University Fort Wayne,Fort Wayne, IN 46805,2010.

Cloud computing for e-governance. White paper, IIIT-Hyderabad, January 2010.Available online (13 pages).

Vidyanand Choudhary. Software as a service: Implications for investment in software development. In HICSS '07: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, page 209a, Washington, DC, USA, 2007. IEEE Computer Society.

Arini Balakrishnan, Chloe Schulze CS701 Construction of Compilers, Instructor: Charles Fischer, Computer Sciences Department, “Code Obfuscation Literature Survey,” University of Wisconsin, Madison, December 19th, 2005

Google app engine. http://code.google.com/appengine/.

Christian S. Collberg and Clark Thombor-son. Watermarking, tamper-proofing, and obfuscation - tools for software protection.In IEEE Transactions on Software Engineering, volume 28, pages 735–746, August 2002