Re-otp Key Management Mechanism for the Cloud Data Security
نویسندگان
چکیده
Cloud storage is one of the most popular services techniques in cloud computing environment. A crucial problem to be addressed in the cloud storage system concerns the security mechanism of protecting the private data and sharing data with other users. Cloud storage services are inherently insecure as the management technique of the data in the cloud storage is controlled by third parties beyond the reach of the data owner. The secrets keys used for obfuscation are stored in a secure location (cloud location) while obfuscated data is stored in the cloud. In this approaches, the data is as secure as its corresponding keys. However, this still brings a challenging issue where a user needs to manage a large number of (secret) keys in such a way that they are guarded against all types of adversaries, and should be as highly available as cloud storage services. In this paper, we present a Re-key management technique to protect the security of user data and enforce the data access control. In our scheme is suitable for personal cloud storage and especially available to enterprise users to management their key of different kinds of resources. We describe the heritage system model, the details of the key management service and a prototype implementation. Keywords— Re-rekeys management; Re key model; Over-Encryption in the cloud Rishi Kumar Sharma et al, International Journal of Computer Science and Mobile Computing, Vol.5 Issue.11, November2016, pg. 44-51 © 2016, IJCSMC All Rights Reserved 45
منابع مشابه
Improvement in Homomorphic Encryption to Increase Cloud Security
Cloud computing provide different services to user. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. To solve the problem of Key management, Key Sharing various schemes have been proposed. The pape...
متن کاملTwo Level Encryption Decryption by Diffie – Hellman and Elliptic Curve Cryptography with Open ID scenario for Securing Cloud Environment
Cloud Computing offers services to end-users rather than a product, by sharing resources, software and other information under a pay per usage model, hence economic benefit is the key for Cloud in terms of capital and operational expenditure. It permits hosting of different types of applications such as business, scientific and social networking because it has key characteristics like multitena...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملProposing Efficient Approach to Improve Integrity Checking in Cloud Data Security
The cloud computing stage gives populace the chance for sharing information resources and services along with the people through internet. In the cloud computing system, both application software and databases are moved to the large data centres, where the data should not be secure in the hands of providers. IT organizations have expressed concerns about the various security aspects that exist ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016