IJSEA Archive (Volume 5, Issue 3)
International Journal of Science and Engineering Applications (IJSEA) (Volume 5, Issue 3 May 2016)
Empirical Study on Data Security Privacy: Data Partition for Centric Key Management Cloud
Keywords: Cloud Computing, Encryption, Key Management, Service Models, Algorithm.
The Cloud Computing is a next generation platform, which provides virtualization with resource pool.There are three types of cloud service models, Infrastructure as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This project proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be
proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.
[1]. P. Mell and T. Grance, “The NIST Definition of Cloud Computing Version 15,” Nat’l Inst. of Standards and Technology, Information Technology Laboratory, vol. 53, p. 50,http://csrc.nist.gov/groups/SNS/cloud-computing/, 2010.
[2].Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta and Asoke Nath. “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm”, 2011 IEEE.
[3] Ravi Shankar Dhakar, Prashant Sharma and Amit Kumar Gupta.“Modified RSA Encryption Algorithm (MREA)”, 2012 IEEE.
[4]. A. Selby and C. Mitchell. “Algorithms for software
implementations of RSA”, IEE PROCEEDINGS.
[5] R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems , Commun. ACM, vol. 21, pp. 120-126, 1978.
[6] Symmetric key cryptography using random key generator, A. Nath, S. Ghosh, M.A. Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July, 2010, Vol-2, P-239-244
[7] William Stallings, "Cryptography and Network Security", ISBN 81-7758-011-6, Pearson Education, Third Edition, pages 42-62,121-144,253-297.
[8] Atul Kahate, "Cryptography and Network Security", ISBN-10:0-07-064823-9, Tata McGraw-Hill Publishing Company Limited, India, Second Edition, pages 38-62,152-165,205-240.
[9] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,” Proc. 13th ACM Conf. Computer and
Comm. Security, pp. 79-88, 2006.
[10] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange,
J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions,” Proc. 25th Ann. Int’l Conf .Advances in Cryptology (CRYPTO ’05), pp. 205-222, 2005.
[11] L. Wiese, “Horizontal Fragp098
7entation for Data Outsourcing with Formula-Based Confidentiality Constraints,” Proc. Fifth Int’l Workshop Security (IWSEC ’10), pp. 101-116, 2010.
@article{Deepika05031002,
title = " Empirical Study on Data Security Privacy: Data Partition for Centric Key Management Cloud ",
journal = "International Journal of Science and Engineering Applications (IJSEA)",
volume = "5",
number = "3",
pages = "120 - 125",
year = "2016",
author = " Deepika P., B.V.N.Sai Kumar, K.Jhansi, K.Lavanya, A.V.S.Sudhakar Rao ",
}