Key Share Management to Protect Data Over Cloud

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Cloud computing is not a new technology it is a new technique of computing. Data which is store over cloud is of sensitive nature that must be protect over cloud from being read and modify by intruder, User data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. According to propose method works on key management and encrypt the data while sending that to the server and automatically get vanished based on passage of time or user activity. The process does not require additional coordination by the data owner, which is of advantage to a very large population of resource-constrained mobile users. By putting the access limit for users over the data can achieve good data confidentiality and integrity. The rate of expiration may be controlled through the initial allocation of shares and the heuristics for removal. A simulation of the scheme and also its implementation on commercial mobile and cloud platforms demonstrate its practical performance.

Authors and Affiliations

Keywords

Related Articles

On the First Record of Syngnathus phlegon Risso, 1827 from the Sea of Marmara, Turkey

The first record of the Syngnathus phlegon in the West part of the Sea of Marmara was reported based on 1 landed specimen 182 mm standard length. Specimen was captured by Beam-Trawl from coastline of Aksaz in the Sea of...

The Presence of Weakly Correlated Noise over Fading Channels on Signal Detection

Cognitive radio is a technology which allows the secondary usage of spectrum allocated to primary users. The cognitive radio networks are networks that have cognitive and reconfigurable properties and the capability to d...

Sub Retinal Deposits as a Complication of Imatinib Mesylate (Gleevec)

"Background Imatinib mesylate(GLEEVEC) is effective for a variety of hematologic and nonhematologic malignancies. Well-known ocular side effects are periorbital edema, epiphora1, extraocular muscle palsy, and blepharocon...

Elucidating the Public Sentiment Fluctuations on Twitter

Now a day’s numbers of people share their opinion on different aspect of life every day. So, twitter is used as microblogging platform for communicate with each other and also tracking and evaluating public emotions. It...

Influence of Students Attitude towards Performance in Mathematics in Primary Schools in Keiyo South District, Kenya

"The purpose of this paper was to examine the influence of students’ attitudes towards performance in mathematics in primary schools in Keiyo South District, Kenya. Descriptive survey design was used in the study to inve...

Download PDF file
  • EP ID EP357418
  • DOI -
  • Views 54
  • Downloads 0

How To Cite

(2015). Key Share Management to Protect Data Over Cloud. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357418