Java Based Resource Sharing with Secure Transaction in User Cloud Environment
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 5)Publication Date: 2012-09-27
Authors : Sanjay Kumar Brahman; Brijesh Patel;
Page : 214-218
Keywords : Private key cryptography; deployment model; cloud; secret key.;
Abstract
The increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. This lead to the demand of cloud computing. But there are some security concerns when we handle and share data in the cloud computing environment. In this paper we proposed a trusted cloud environment. In this environment we upload the data after applying private-key cryptography. In this a secret key may be held by one person or exchanged between the sender and the receiver of a message. The cloud admin can read the data after applying the same key for decryption. If the Admin want to update the data then again a decryption key is needed but it is different from the reading key. We also provide sharing of data which is based on the deployment model of the cloud architecture.
Other Latest Articles
- A Review of Density-Based clustering in Spatial Data
- Feature Extraction of Mammograms
- A Study Paper on IDS Attack Classification Using Various Data Mining Techniques
- Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network
- SVD Detection for Cognitive Radio Network based on Average of Maximum-Minimum of the ICDF
Last modified: 2014-11-25 18:43:00