Downloads: 119 | Views: 156
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
Key Share Management to Protect Data Over Cloud
Prof. Priyanka Ambatkar | Prof. Reena Gadge
Abstract: Cloud computing is not a new technology it is a new technique of computing. Data which is store over cloud is of sensitive nature that must be protect over cloud from being read and modify by intruder, User data may be stored in a cloud to take advantage of its scalability, accessibility, and economics. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. According to propose method works on key management and encrypt the data while sending that to the server and automatically get vanished based on passage of time or user activity. The process does not require additional coordination by the data owner, which is of advantage to a very large population of resource-constrained mobile users. By putting the access limit for users over the data can achieve good data confidentiality and integrity. The rate of expiration may be controlled through the initial allocation of shares and the heuristics for removal. A simulation of the scheme and also its implementation on commercial mobile and cloud platforms demonstrate its practical performance.
Keywords: Distributed system, Mobile computing, Security, Cryptography
Edition: Volume 4 Issue 3, March 2015,
Pages: 1684 - 1689