Key Share Management to Protect Data Over Cloud
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
Cloud computing is not a new technology it is a new technique of computing. Data which is store over cloud is of sensitive nature that must be protect over cloud from being read and modify by intruder, User data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. According to propose method works on key management and encrypt the data while sending that to the server and automatically get vanished based on passage of time or user activity. The process does not require additional coordination by the data owner, which is of advantage to a very large population of resource-constrained mobile users. By putting the access limit for users over the data can achieve good data confidentiality and integrity. The rate of expiration may be controlled through the initial allocation of shares and the heuristics for removal. A simulation of the scheme and also its implementation on commercial mobile and cloud platforms demonstrate its practical performance.
Reversible Data Hiding in Encrypted Images for Large Data Size Using DCT
This letter proposes a method of reversible data hiding method in encrypted images for large data size using DCT. Reversible data hiding is a technique to embed additional message into some cover media with a reversible...
A Review on OFDM Technique & ITS Implementation
Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier system where data bits are encoded to multiple sub-carriers, while being sent simultaneously. This results in the optimal usage of b...
Design of a Cleaner Production Framework to Enhance Productivity: Case Study of Leather Company
Design of a Cleaner Production Framework to Enhance Productivity: Case Study of Leather Company
Data Secure in Cloud Computing Using Encryption Algorithms
"Cloud computing is the outsourcing of IT communications by the use of the Internet and maintaining own hardware and software environment. Cloud computing facilitates computing assets on demand by the use of a service pr...
Socio-Economic Conditions of Female Workers in Brick Kilns - An Exploitation to Healthy Social Structure: A Case Study on Khejuri CD Blocks in Purba Medinipur, West Bengal
Brick Industry is one of the informal/unorganized industries in India. This industry is booming with the expansion of real estate business. It is a labor intensive industry. The industry employs millions of workers. Siza...