Data Security and Privacy using Data Partition and Centric key management in Cloud

被引:0
|
作者
Patel, Krunal [1 ]
Kumar, Sendhil K. S. [2 ]
Singh, Navneet [1 ]
Parikh, Kushang [1 ]
Jaisankar, N. [2 ]
机构
[1] Vellore Inst Technol, CSE SCSE, Vellore, Tamil Nadu, India
[2] Vellore Inst Technol, SCSE, Vellore, Tamil Nadu, India
关键词
Cloud Computing; Encryption; Key Management; Service Models; Algorithm;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This research paper proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Data-centric security: Integrating data privacy and data security
    Hennessy, Shawn D.
    Lauer, George D.
    Zunic, Nev
    Gerber, Benjamin
    Nelson, Adam C.
    IBM Journal of Research and Development, 2009, 53 (02):
  • [2] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [3] Data Security and Privacy in the Cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Samarati, Pierangela
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2019, 2019, 10993
  • [4] Data protection - Security: Data security - The key to privacy
    Carey, Peter
    Berry, David
    Computer Law and Security Report, 2002, 18 (02): : 112 - 113
  • [5] Data Security and Privacy for Outsourced Data in the Cloud
    Sahin, Cetin
    El Abbadi, Amr
    2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1731 - 1734
  • [6] An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud
    Gupta, Rishabh
    Gupta, Ishu
    Singh, Ashutosh Kumar
    Saxena, Deepika
    Lee, Chung-Nan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2445 - 2454
  • [7] Cloud Security Ecosystem for Data Security and Privacy
    Arora, Akshay
    Khanna, Abhirup
    Rastogi, Anmol
    Agarwal, Amit
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 288 - 292
  • [8] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    ZTECommunications, 2013, 11 (02) : 18 - 23
  • [9] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [10] Privacy-Preserving Cloud Data Security : Integrating the Novel Opacus Encryption and Blockchain Key Management
    Poorani, S.
    Anitha, R.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (11): : 3182 - 3203