Data Security and Privacy using Data Partition and Centric key management in Cloud

被引:0
作者
Patel, Krunal [1 ]
Kumar, Sendhil K. S. [2 ]
Singh, Navneet [1 ]
Parikh, Kushang [1 ]
Jaisankar, N. [2 ]
机构
[1] Vellore Inst Technol, CSE SCSE, Vellore, Tamil Nadu, India
[2] Vellore Inst Technol, SCSE, Vellore, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2014年
关键词
Cloud Computing; Encryption; Key Management; Service Models; Algorithm;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This research paper proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.
引用
收藏
页数:5
相关论文
共 21 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
Abdel-Kader Rehab F., ENETICALLY IMPROVED
[3]  
[Anonymous], NIST DEFINITION CLOU
[4]  
chatterjee Dripto, 2011, NEW SYMMETRIC KEY CR
[5]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[6]  
Dhakar Ravi Shankar, 2012, MMODIFIED RSA ENRYPT
[7]  
Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13
[8]  
Khanna Neeraj, 2011, NEW SYMMETRIC KEY CR
[9]  
Kumar Niraj, 2013, BOOLEAN ALGEBRA BASE
[10]  
Liu Bin, 2013, IEEE T