Data Security Model for Cloud Computing Using VGRT Methodology
Ravindar mogili
Associate Professor
Dept. of Computer Science and Engineering
Jyothishmathi Institute of
Technology and Science
(JNTUH)
Karimnagar, Telangana, India mogili.ravindar@jits.ac.in
Mohammad Abdul RaqueeB
Dept. of Computer Science and Engineering
UG Student
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India raqueebabdul8@gmail.com
Vyshnavi Chinthakindi
Dept. of Computer Science and Engineering
UG Student
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India
chintakindivyshnavi@gmail.com
SHASHIKANTH KANDuKURI
Associate Professor
Dept. of Computer Science and Engineering
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India
shashi1215@gmail.com
Prasad Yedapalli
Dept. of Computer Science and Engineering
UG Student
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India
prasadyedapalli@gmail.com
Poornodaya Vadlakonda
Dept. of Computer Science and Engineering
UG Student
Jyothishmathi Institute of
Technology and Science
(JNTUH)
Karimnagar, Telangana, India poornodaya2005@gmail.com
Rajkumar Kampelly
Dept. of Computer Science and Engineering
UG Student
Jyothishmathi Institute of Technology and Science
(JNTUH)
Karimnagar, Telangana, India
kampellyrajkumar3@gmail.com
Abstract— Cloud computing has become a popular solution for storing and managing data due to its flexibility, scalability, and cost-effectiveness. However, it also introduces significant challenges related to data security, access control, and trust, especially in multi-user environments. This paper presents a structured data security model based on the Verification–Generation–Retrieval–Trust (VGRT) methodology. The proposed approach ensures secure data handling by integrating four key components: verifying user identity, securely generating encrypted data, enabling controlled data retrieval, and establishing trust through data integrity validation. In this model, data is encrypted before storage, and access is granted only to authorized users through multi-user private key verification. A database is used to manage encrypted data and access-related information, ensuring transparency and control. Experimental results demonstrate that the proposed VGRT-based model significantly improves data confidentiality, access control, and trust in cloud computing environments.
Keywords— cloud computing data security VGRT verification generation retrieval trust multi user key encryption access control