Key Share Management to Protect Data Over Cloud

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Cloud computing is not a new technology it is a new technique of computing. Data which is store over cloud is of sensitive nature that must be protect over cloud from being read and modify by intruder, User data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. According to propose method works on key management and encrypt the data while sending that to the server and automatically get vanished based on passage of time or user activity. The process does not require additional coordination by the data owner, which is of advantage to a very large population of resource-constrained mobile users. By putting the access limit for users over the data can achieve good data confidentiality and integrity. The rate of expiration may be controlled through the initial allocation of shares and the heuristics for removal. A simulation of the scheme and also its implementation on commercial mobile and cloud platforms demonstrate its practical performance.

Authors and Affiliations

Keywords

Related Articles

Reversible Data Hiding in Encrypted Images for Large Data Size Using DCT

This letter proposes a method of reversible data hiding method in encrypted images for large data size using DCT. Reversible data hiding is a technique to embed additional message into some cover media with a reversible...

A Review on OFDM Technique & ITS Implementation

Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier system where data bits are encoded to multiple sub-carriers, while being sent simultaneously. This results in the optimal usage of b...

Design of a Cleaner Production Framework to Enhance Productivity: Case Study of Leather Company

Design of a Cleaner Production Framework to Enhance Productivity: Case Study of Leather Company

Data Secure in Cloud Computing Using Encryption Algorithms

"Cloud computing is the outsourcing of IT communications by the use of the Internet and maintaining own hardware and software environment. Cloud computing facilitates computing assets on demand by the use of a service pr...

Socio-Economic Conditions of Female Workers in Brick Kilns - An Exploitation to Healthy Social Structure: A Case Study on Khejuri CD Blocks in Purba Medinipur, West Bengal

Brick Industry is one of the informal/unorganized industries in India. This industry is booming with the expansion of real estate business. It is a labor intensive industry. The industry employs millions of workers. Siza...

Download PDF file
  • EP ID EP357418
  • DOI -
  • Views 53
  • Downloads 0

How To Cite

(2015). Key Share Management to Protect Data Over Cloud. UNKNOWN, 4(3), -. https://www.europub.co.uk/articles/-A-357418