Total views : 437

Securing Cloud Data in Transit using Data Masking Technique in Cloud Enabled Multi Tenant Software Service


  • Department of CSE, Karpagam University, Coimbatore - 641021, Tamil Nadu, India


Background/Objectives: The paper discusses about the data security issues in the cloud computing environment. It employs data masking to hide sensitive data from cloud services thereby ensuring reliability and trust in the cloud environment. Methods/Statistical Analysis: Data access in the cloud environment can be categorized into three such as at rest, at transit ,in use. The main aim of this paper is integrate security in data masking techniques. We employ the existing mechanisms to the cloud environment to secure the data with virtual machine masking and platform masking. Findings: The masked data is transmitted to the processing environment. The services in cloud utilize this masked data for processing. It is comparatively secured when compared to the conventional technique. This mechanism increases the trust worthiness and can be masked dynamically or statistically in application or database based service environments. Application/Improvements: The main application of this research is to serve people with secured cloud, thereby overcoming the data security issues.


Cloud Environment, Cloud Service Provider, Data Masking.

Full Text:

 |  (PDF views: 432)


  • Srivenkatesh M, Vanitha K. Implementing Multi prime RSA Algorithm to Enhance the Data Security in Cloud Computing. International Journal of Innovative Research in Science, Engineering and Technology. 2015; 4(4):647–50.
  • Mathisen E. Security challenges and solutions in cloud computing. 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST), Daejeon, Korea. 2011. p. 208–12.
  • Liu W. Research on Cloud Computing Security Problem and strategy. 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang. 2012. p. 1216–19.
  • Wang C, Wang Q, Ren K, Lou W. Ensuring Data Storage Security in Cloud Computing, 17th International Workshop on Quality of Service, IWQoS, Charleston, SC. 2009; 1–9.
  • Juels A, Burton J, Kaliski S. PORs: Proofs of Retrievability for Large Files, Proceedings of 14th ACM Conference on Computer and Communications Security, CCS ’07. 2007. p. 584–97.
  • Shacham H, Waters B. Compact Proofs of Retrievability. Journal of Cryptology. 2013; 26(3):442–83.
  • Bowers KD, Juels A, Oprea A. Proofs of Retrievability: Theory and Implementation. Proceedings of the 2009 ACM Workshop on Cloud Computing Security. 2009; 43–54.
  • Lawrence A, Irudayasamy A. Enhanced Algorithm for Data Privacy Preservation using Data Anonymization with Low Information Loss in Public cloud. International Journal of Intelligent Computing Research (IJICR). 2014; 5(3/4):505–11.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.