CLOUD CLOCKING: A Privacy-Preserving Framework for Cloud Data Access Using the Data Concealment Model

  • Unique Paper ID: 180351
  • PageNo: 1064-1068
  • Abstract:
  • Although cloud computing offers on-demand resource access, the requirement for reliable data-handling agreements makes cross-organizational data sharing difficult. Since businesses need to have faith that others will follow the law, protecting data is essential. By hiding access patterns, this project presents the Data Concealment Model, which improves cloud data security. To differentiate real users from bots, it uses four cloaking strategies: Long-Term, Multi-Region Based, Time-Based, and Geolocation-Based Cloaking. Disguised content is sent to unauthorized users to stop intrusions. In order to hide content from unwanted access attempts, the model also employs the Camouflage Data Disguise technique, which combines Winnowing and Chaffing with ChaCha20 encryption. This method simplifies key management, provides location-aware access control, and guarantees data confidentiality. It offers a safe, privacy-focused framework for safe, seamless cloud computing by tackling fundamental data-sharing issues. smooth access to cloud data for all organizations.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{180351,
        author = {PRASANTH A and S SANGEETHA},
        title = {CLOUD CLOCKING: A Privacy-Preserving Framework for Cloud Data Access Using the Data Concealment Model},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {12},
        number = {1},
        pages = {1064-1068},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=180351},
        abstract = {Although cloud computing offers on-demand resource access, the requirement for reliable data-handling agreements makes cross-organizational data sharing difficult. Since businesses need to have faith that others will follow the law, protecting data is essential. By hiding access patterns, this project presents the Data Concealment Model, which improves cloud data security. To differentiate real users from bots, it uses four cloaking strategies: Long-Term, Multi-Region Based, Time-Based, and Geolocation-Based Cloaking. Disguised content is sent to unauthorized users to stop intrusions. In order to hide content from unwanted access attempts, the model also employs the Camouflage Data Disguise technique, which combines Winnowing and Chaffing with ChaCha20 encryption. This method simplifies key management, provides location-aware access control, and guarantees data confidentiality. It offers a safe, privacy-focused framework for safe, seamless cloud computing by tackling fundamental data-sharing issues. smooth access to cloud data for all organizations.},
        keywords = {},
        month = {June},
        }

Cite This Article

A, P., & SANGEETHA, S. (2025). CLOUD CLOCKING: A Privacy-Preserving Framework for Cloud Data Access Using the Data Concealment Model. International Journal of Innovative Research in Technology (IJIRT), 12(1), 1064–1068.

Related Articles