Authors can submit their research articles to editor@ijsea.com  

Processing Charges

IJSEA is index with

 

 

 

 

 

 

 

IJSEA Archive (Volume 5, Issue 3)

International Journal of Science and Engineering Applications (IJSEA)  (Volume 5, Issue 3 May 2016)

Empirical Study on Data Security Privacy: Data Partition for Centric Key Management Cloud

Deepika P., B.V.N.Sai Kumar, K.Jhansi, K.Lavanya, A.V.S.Sudhakar Rao





 PDF 



Keywords: Cloud Computing, Encryption, Key Management, Service Models, Algorithm.

Abstract References BibText


        The Cloud Computing is a next generation platform, which provides virtualization with resource pool.There are three types of cloud service models, Infrastructure as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This project proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.


[1]. P. Mell and T. Grance, “The NIST Definition of Cloud Computing Version 15,” Nat’l Inst. of Standards and Technology, Information Technology Laboratory, vol. 53, p. 50,http://csrc.nist.gov/groups/SNS/cloud-computing/, 2010.
[2].Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta and Asoke Nath. “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm”, 2011 IEEE.
[3] Ravi Shankar Dhakar, Prashant Sharma and Amit Kumar Gupta.“Modified RSA Encryption Algorithm (MREA)”, 2012 IEEE.
[4]. A. Selby and C. Mitchell. “Algorithms for software implementations of RSA”, IEE PROCEEDINGS.
[5] R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems , Commun. ACM, vol. 21, pp. 120-126, 1978.
[6] Symmetric key cryptography using random key generator, A. Nath, S. Ghosh, M.A. Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July, 2010, Vol-2, P-239-244
[7] William Stallings, "Cryptography and Network Security", ISBN 81-7758-011-6, Pearson Education, Third Edition, pages 42-62,121-144,253-297.
[8] Atul Kahate, "Cryptography and Network Security", ISBN-10:0-07-064823-9, Tata McGraw-Hill Publishing Company Limited, India, Second Edition, pages 38-62,152-165,205-240.
[9] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,” Proc. 13th ACM Conf. Computer and Comm. Security, pp. 79-88, 2006.
[10] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions,” Proc. 25th Ann. Int’l Conf .Advances in Cryptology (CRYPTO ’05), pp. 205-222, 2005.
[11] L. Wiese, “Horizontal Fragp098 7entation for Data Outsourcing with Formula-Based Confidentiality Constraints,” Proc. Fifth Int’l Workshop Security (IWSEC ’10), pp. 101-116, 2010.


@article{Deepika05031002,
title = " Empirical Study on Data Security Privacy: Data Partition for Centric Key Management Cloud ",
journal = "International Journal of Science and Engineering Applications (IJSEA)",
volume = "5",
number = "3",
pages = "120 - 125",
year = "2016",
author = " Deepika P., B.V.N.Sai Kumar, K.Jhansi, K.Lavanya, A.V.S.Sudhakar Rao ",
}