Effective Key Management (EKM) for Class Based Cloud Data

Dileep Kumar Reddy P*, R. Praveen Sam**
* Lecturer, Department of Computer Science and Engineering, JNTUA College of Engineering, Ananthapuramu, India.
** Professor, Department of Computer Science and Engineering, GPREC, Kurnool, India.
Periodicity:August - October'2016
DOI : https://doi.org/10.26634/jcc.3.4.13595

Abstract

Security in Class Based Cloud Data is undoubtedly one of the challenging tasks in Cloud Computing. Class based Cloud structure is totally a new concept where the cloud can be divided into a number of classes. Through this, a protected cloud could be implemented in hybrid cloud which helps to reduce the time and cost of searching and maintenance. Normally, the classes can be divided based on the usage of the cloud and for each and every class, there is a key for data security. This paper explains about the key management to different classes and allows the authenticated users to use them.

Keywords

Key Management, Class Based Clouds, Class Data Security, EKM.

How to Cite this Article?

Reddy. P. D. K., and Sam. R. P. (2016). Effective Key Management (EKM) for Class Based Cloud Data. i-manager’s Journal on Cloud Computing, 3(4), 18-25. https://doi.org/10.26634/jcc.3.4.13595

References

[1]. Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(2), 468-477.
[2]. Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud security issues. In Services Computing, 2009. SCC'09. IEEE International Conference on (pp. 517-520). IEEE.
[3]. Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE Security & Privacy, 7(4), 62-64.
[4]. Khedkar, S. V., & Gawande, A. D. (2014). Data partitioning technique to improve cloud data storage security. International Journal of Computer Science and Information Technologies, 5(3), 3347-50.
[5]. López-Alt, A., Tromer, E., & Vaikuntanathan, V. (2012, May). On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In Proceedings of the 44th Annual ACM Symposium on Theory of Computing (pp. 1219-1234). ACM.
[6]. Mohamed, E. M., Abdelkader, H. S., & El-Etriby, S. (2012, May). Enhanced data security model for cloud computing. In Informatics and Systems (INFOS), 2012 8th International Conference on (pp. CC-12). IEEE.
[7]. Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69-73.
[8]. Sood, S. K. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35(6), 1831-1838.
[9]. Wang, B., Chow, S. S., Li, M., & Li, H. (2013, July). Storing shared data on the cloud via security-mediator. In Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on (pp. 124-133). IEEE.
[10]. Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing. Computer Security–ESORICS 2009, 355-370.
[11]. Ye, Y., Xiao, L., Yen, I. L., & Bastani, F. (2010, December). Cloud storage design based on hybrid of replication and data partitioning. In Parallel and Distributed Systems (ICPADS), 2010 IEEE 16th International Conference on (pp. 415-422). IEEE.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.