scispace - formally typeset
Proceedings ArticleDOI

Data security and privacy using data partition and centric key management in cloud

Reads0
Chats0
TLDR
This research paper proposed new methodology that secures data and provide privacy to the customer in cloud by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism.
Abstract
The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This research paper proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.

read more

Citations
More filters
Journal ArticleDOI

Cryptographic Tree and Its Key Management for Securing Outsourced Data in the Cloud

TL;DR: This work proposes a very practical approach of providing privacy to the data outsourced in the cloud environment which makes use of both Cryptographic Tree and its key management to secure the data Outsourced inThe cloud.
Journal ArticleDOI

Making a Cloud Data Secure and Effective for Better Performance of Services

TL;DR: A new methodology is proposed that can efficiently managed the security to the data and provide privacy to the consumer using the services of the cloud and makes the flexibility to the cloud infrastructure.
Journal ArticleDOI

Blockchain-Based Decentralized Documentation System

TL;DR: In this paper , a decentralized online registration using blockchain (BC) makes it comfortable for citizens to transfer property, prevents touting of the same property to various buyers, and also helps the government to monitor and keep track of property movement to prevent money laundering on real estate.
Journal ArticleDOI

A Privacy Protection Evaluation Mechanism for Dynamic Data Based on Chunk-Confusion

TL;DR: The experimental evaluation proves that rationality of dynamic the evaluation mechanism proposed in this paper has better feasibility and practicality for big data privacy protection.
References
More filters
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Book ChapterDOI

Cryptographic cloud storage

TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Book ChapterDOI

Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions

TL;DR: This work identifies and fills some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS) and provides a transform of an anonymous IBE scheme to a secure PEKS scheme that guarantees consistency.
Proceedings Article

Security threats in cloud computing

TL;DR: This study aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing.