A Security Key Management Model for Cloud Environment

Authors

  • Nitesh Jain Dept. of Computer Science, Govt. (Model, Autonomous) Holkar Science College, Indore, INDIA
  • Pradeep Sharma Dept. of Computer Science, Govt. (Model, Autonomous) Holkar Science College, Indore, INDIA

Keywords:

Cloud Computing, Security Model, Data Security, Cloud Environment

Abstract

Security is the most important factor in cloud computing for ensuring client data is placed on secure mode in the cloud. For any organization, Data is very valuable assets but as number of users and quantity of data is increasing day by day, which cause the need of data security on cloud. For cloud computing there should be various security and privacy measures like identity management, physical personal security, availability, application processing authentication, atomic transaction etc. Security is mostly broken when any one doesn’t follow certain security measure or not being attentive for threat and vulnerabilities. Dealing with “One Cloud” providers is predicted to become minor popular with customers due to risks of service availability failure and the possibility of malicious insiders in the one cloud. In this research paper we have also dealing with a security key management model for cloud environment or cloud of cloud.

 

References

S.L. Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.

R. Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.

S. Ayyub, D. Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.

G.Malini and A.Immaculate Mercy , "Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.277-281, 2015.

S.Sujitha and S. J. Mohana, "Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.181-184, 2015.

Md Kausar Alam, Sharmila Banu K, “An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds”, International Journal of Scientific and Research Publications, vol. 3, issue 4, pp.23-28, 2013.

A. Juels, B.S. Kaliski Jr, "PORs: Proofs of retrievability for large files", CCS '07: Proc. 14th ACM Conf. on Computer and communications security, 2007, pp. 584-597.

C. Cachin, I. Keidar, A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.

H. Abu-Libdeh, L. Princehouse, H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC'10: Proc. 1st

Rakesh Prasad Sarang and Rajesh Kumar Bunkar, "Study of Services and Privacy Usage in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.7-12, 2013.

R. Sood, R. Sharma, "Cloud Security Threats and Issues-A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.115-119, 2017.

F. Rocha and M. Correia, "Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud", Proc. 1stIntl. Workshop of Dependability of Clouds, Data Centers and Virtual Computing Environments, China, pp.129-134, 2011.

Downloads

Published

2017-02-28

How to Cite

[1]
N. Jain and P. Sharma, “A Security Key Management Model for Cloud Environment”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 1, pp. 45–48, Feb. 2017.

Issue

Section

Research Article