Key Share Management to Protect Data Over Cloud

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

Cloud computing is not a new technology it is a new technique of computing. Data which is store over cloud is of sensitive nature that must be protect over cloud from being read and modify by intruder, User data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. According to propose method works on key management and encrypt the data while sending that to the server and automatically get vanished based on passage of time or user activity. The process does not require additional coordination by the data owner, which is of advantage to a very large population of resource-constrained mobile users. By putting the access limit for users over the data can achieve good data confidentiality and integrity. The rate of expiration may be controlled through the initial allocation of shares and the heuristics for removal. A simulation of the scheme and also its implementation on commercial mobile and cloud platforms demonstrate its practical performance.

Authors and Affiliations

Keywords

Related Articles

Evaluation of the Effect of Cultural Conditions for Efficient Power Generation by Pseudomonas using Microbial Fuel Cell System

The application of Microbial Fuel Cell (MFC) for electricity generation and waste water treatment has been developing recently. In recent years, researchers have shown that MFCs can be used to produce electricity from wa...

Strategy for Improvement of Maternal Health in Nepal

Maternal death is a public health problem in like Nepal. Still women have been facing the pregnancy related problems due to inaccessible and poor quality health service as well as a less available health service from ski...

Isolated Spoken Word Identification in Malayalam using Mel-frequency Cepstral Coefficients and K-means clustering

This paper proposes an approach to recognize isolated spoken Malayalam words. The paper deals with a speech feature extraction technique based on MFCC and K-mean clustering. We used six Malayalam words for the experiment...

An Implementation of Watershed based Image Segmentation Algorithm using FPGA Processor

In this work, the watershed algorithm is used as a method in solving the image segmentation problem. However, of the many variants of the watershed algorithm not all are equally well suited for hardware implementation....

Determination of Some Heavy Metals in Water Collected From River Chublat (Hassan Abdal) Pakistan

Rivers are contaminated constantly by heavy metals from the atmosphere. Considering this fact, the World Health Organization and Environmental Protection Agency recommended qualitative and quantitative assay of heavy met...

Download PDF file
  • EP ID EP357418
  • DOI -
  • Views 46
  • Downloads 0

How To Cite

(2015). Key Share Management to Protect Data Over Cloud. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357418