Secure Data Sharing Using Compact Summation key in HybridCloud Storage
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Data security is crucial aspect in cloud storage. Providing security to a single file or to set of files isanother important factor. In cloud, security is applied to a set of files i.e. to central location. In file sharingapproach a single key can be used to gain access to storage. Applying security to each file in cloud is notpossible with cloud environment. To solve this type ofproblems, new improved key assignment scheme have tobe used. New improved algorithm that satisfies these conditions is summation key encryption. Summation key isof power more than two keys. It takes one public key, known to both parties & another key is generated usingkeygen algorithm. Data owner retrieves the summation key from the alternatives made to share data. This keycan be dispatch to second user using secure channel for example email or smart cards. Summation key iscompact in size & also decrease the size of files after encryption. Time duration required to generate summationkey is very short as compare to Identity based or Attribute based encryption scheme.Practically how thisalgorithm is beneficial to provide security to individual files in cloud repositoryis described here.
Authors and Affiliations
Pratap M Mohite, , DipaDharmadhikari , RavindraBankar
Effective Modular Order Preserving Encryption on Cloud UsingMHGD
Abstract: Cloud computing strengthens its presence in the public sector, Organizations and individuals arelooking for cloud services to improve productivity, security and reduce costs. Apart from communication, filestora...
Evaluation of Intrusion Detection Schemes in Wireless Sensor Network
Abstract: Wireless Sensor Network (WSN) consists of sensor nodes, which communicate wirelessly in order to perform some specific operation. Wireless Sensor Network (WSN) is implemented in open medium environmentand the s...
Dynamic Process Scheduling and Sequencing Using Genetic Algorithm
Abstract: This paper present the implementation of genetic algorithm for operating system process scheduling. Scheduling in operating systems has a significant role in overall system performance and throughput. An...
An Enhanced Scheme for Hiding Text in Wave Files
Abstract: Steganography is a term applied to any number of processes that embed an object into another object in order to deceive any observer or adversary. An embedding algorithm for hiding messages into wave files or a...
Modeling and Simulation of Solar Photovoltaic module using Matlab/Simulink
This paper presents the circuit model of photovoltaic (PV) module. Simulation and modeling is done using MATLAB/ Simulink software package. The proposed model is user friendly and can be used as a common pl...