<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>ijesm</PublisherName>
      <JournalTitle>International Journal of Engineering, Science and</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 6, Issue 8,</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Multidisciplinary</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>December 2017 (Special Issue)</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2017</Year>
        <Month>12</Month>
        <Day>25</Day>
      </PubDate>
      <ArticleType>Engineering, Science and Mathematics</ArticleType>
      <ArticleTitle>Cloud Computing-Data security using cryptographic technique to control Data Access Privileges in Cloud.</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>1052</FirstPage>
      <LastPage>1058</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Maheswararao Kenguva? Ratna Kumar</FirstName>
          <LastName>J??</LastName>
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
        </Author>
      </AuthorList>
      <DOI/>
      <Abstract>In the cloud computing environment, the data security plays a major role, because the data is placed in various locations across the world. Data security and isolation protection are the two main factors of user__ampersandsign#39;s concerns about the cloud computing technology. Data stored in the cloud to provide data confidentiality, data integrity, data access control, and data sharing. This paper is developing a system to control the data access by the unauthorized users. Using Google App Engine to provide various types of access controls and also protect the data for the users through cryptographic technique with minimal performance degradation the data should be securely stored in the public cloud service provider. This paper describes briefly about CCAF (Cloud Computing Adoption Framework) model for securing cloud data. This system is designed based on the necessities and the execution demonstrated by the CCAF multi-layered security.  CCAF multi-layered security can be categorized into three layers to protect the data in real-time: 1) firewall and access control; 2) identity management and intrusion detection and prevention and 3) Encryption.  CCAF can merge with the Auditing facility to record each and every action done by the user and system details of the registered users. CCAF also achieves to identify de-duplication is performed on a single file based on their hash values. The hash numbers are relatively easy to generate. Hence it requires less processing power.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Isolation; Confidentiality;  Integrity; data sharing;  de-duplication;  CryptographicTechnique; CCAF.</Keywords>
      <URLs>
        <Abstract>https://ijesm.co.in/ubijournal-v1copy/journals/abstract.php?article_id=4342&amp;title=Cloud Computing-Data security using cryptographic technique to control Data Access Privileges in Cloud.</Abstract>
      </URLs>
      <References>
        <ReferencesarticleTitle>References</ReferencesarticleTitle>
        <ReferencesfirstPage>16</ReferencesfirstPage>
        <ReferenceslastPage>19</ReferenceslastPage>
        <References/>
      </References>
    </Journal>
  </Article>
</ArticleSet>