A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment

Yogeswararao Gairaboina, Y. Siva Prasad

Cloud Computing is a service based technology and, one of the service based cloud is Data Storage as a Service (DSaS), Cloud has been an readymade option for data storage, Basically an Cloud Service Provider (CSP) provides DSaS for the user, and user from anywhere can store their data on to the cloud by means internet connectivity. This transfer of data from user data origin to the cloud storage destination involves many security issues which has to be answered by the cloud provider, many researchers have proposed valuable research but still an economical and business model has to be searched, we proposed an ECC based PKI certificate framework. ECC based PKI has advantages over tradition RSA based PKI along cost of computation, key size, transmission overhead. We have designed Secured Cloud Storage Framework (SCSF). In this framework, users not only can securely store and access data in cloud but also can share data with multiple users through the unsecured internet in a secured way. This scheme can ensure the security and privacy of the data in the cloud.

Keywords: Cloud storage, Cloud computing, ECC, PKI, Certificate

Edition: Volume 3 Issue 11, November 2014

Pages: 5 - 9

Share this Article

How to Cite this Article?

Yogeswararao Gairaboina, Y. Siva Prasad, "A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=26101405, Volume 3 Issue 11, November 2014, 5 - 9

95 PDF Views | 69 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud storage'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2098 - 2102

Public Auditing System with Auto-Data Recovery System on Cloud Scheme

Dhane Sachin V., Joshi P.

Share this Article

Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Bird's Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and It's Types in Mobile Network

Palak Jain

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1063 - 1066

A Survey on Automatic Fault Detection Framework for Cloud based Application

Kshitija Nandgaonkar, Swarupa Kamble

Share this Article

Similar Articles with Keyword 'ECC'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2571 - 2577

Large-Scale Cost-Effective Secured Content Distribution in the Cities Using Vehicular Networks

Vinay M Naganur, Anand R

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Similar Articles with Keyword 'PKI'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar, Dr. M. S. Ali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 5 - 9

A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment

Yogeswararao Gairaboina, Y. Siva Prasad

Share this Article

Similar Articles with Keyword 'Certificate'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar, Dr. M. S. Ali

Share this Article

Research Paper, Computer Science & Engineering, Nigeria, Volume 7 Issue 8, August 2018

Pages: 1671 - 1677

Using Web Service for Generating Permanent Voter Cards (PVCs) for Nigerian Citizens

Anichebe Gregory Emeka

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this Article
Top