Key Share Management to Protect Data Over Cloud
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Priyanka Ambatkar; Reena Gadge;
Page : 1684-1689
Keywords : Distributed system; Mobile computing; Security; Cryptography;
Abstract
Cloud computing is not a new technology it is a new technique of computing. Data which is store over cloud is of sensitive nature that must be protect over cloud from being read and modify by intruder, User data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. According to propose method works on key management and encrypt the data while sending that to the server and automatically get vanished based on passage of time or user activity. The process does not require additional coordination by the data owner, which is of advantage to a very large population of resource-constrained mobile users. By putting the access limit for users over the data can achieve good data confidentiality and integrity. The rate of expiration may be controlled through the initial allocation of shares and the heuristics for removal. A simulation of the scheme and also its implementation on commercial mobile and cloud platforms demonstrate its practical performance.
Other Latest Articles
- A Review of Diverse Pitch&Detection Methods
- Comparative Study Between Omental Plugging With Controlled Tube Duodenostomy for Management of Giant Duodenal Ulcer Perforation
- Remote Control of Electrical Appliances by Mobile SMS Using STC89C52RC Microcontroller
- Optimization of Composite Pressure Vessel
- Over View of Past Literature and Making Comparative Analysis Along with Our Strategy of Materialized View Selection
Last modified: 2021-06-30 21:34:49