Proceedings ArticleDOI
Data security and privacy using data partition and centric key management in cloud
Reads0
Chats0
TLDR
This research paper proposed new methodology that secures data and provide privacy to the customer in cloud by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism.Abstract:
The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This research paper proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.read more
Citations
More filters
Journal ArticleDOI
Cryptographic Tree and Its Key Management for Securing Outsourced Data in the Cloud
TL;DR: This work proposes a very practical approach of providing privacy to the data outsourced in the cloud environment which makes use of both Cryptographic Tree and its key management to secure the data Outsourced inThe cloud.
Journal ArticleDOI
Making a Cloud Data Secure and Effective for Better Performance of Services
TL;DR: A new methodology is proposed that can efficiently managed the security to the data and provide privacy to the consumer using the services of the cloud and makes the flexibility to the cloud infrastructure.
Journal ArticleDOI
Blockchain-Based Decentralized Documentation System
TL;DR: In this paper , a decentralized online registration using blockchain (BC) makes it comfortable for citizens to transfer property, prevents touting of the same property to various buyers, and also helps the government to monitor and keep track of property movement to prevent money laundering on real estate.
Journal ArticleDOI
A Privacy Protection Evaluation Mechanism for Dynamic Data Based on Chunk-Confusion
TL;DR: The experimental evaluation proves that rationality of dynamic the evaluation mechanism proposed in this paper has better feasibility and practicality for big data privacy protection.
References
More filters
Proceedings ArticleDOI
Searchable symmetric encryption: improved definitions and efficient constructions
TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Book ChapterDOI
Cryptographic cloud storage
Seny Kamara,Kristin E. Lauter +1 more
TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Book ChapterDOI
Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions
Michel Abdalla,Mihir Bellare,Dario Catalano,Eike Kiltz,Tadayoshi Kohno,Tanja Lange,John Malone-Lee,Gregory Neven,Pascal Paillier,Haixia Shi +9 more
TL;DR: This work identifies and fills some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS) and provides a transform of an anonymous IBE scheme to a secure PEKS scheme that guarantees consistency.
Proceedings Article
Security threats in cloud computing
TL;DR: This study aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing.