Full Paper View Go Back

A Security Key Management Model for Cloud Environment

Nitesh Jain1 , Pradeep Sharma2

  1. Dept. of Computer Science, Govt. (Model, Autonomous) Holkar Science College, Indore, INDIA.
  2. Dept. of Computer Science, Govt. (Model, Autonomous) Holkar Science College, Indore, INDIA.

Correspondence should be addressed to: jain2014.nj@gmail.com.


Section:Research Paper, Product Type: Isroset-Journal
Vol.5 , Issue.1 , pp.45-48, Feb-2017


Online published on Feb 28, 2017


Copyright © Nitesh Jain, Pradeep Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nitesh Jain, Pradeep Sharma, “A Security Key Management Model for Cloud Environment,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.45-48, 2017.

MLA Style Citation: Nitesh Jain, Pradeep Sharma "A Security Key Management Model for Cloud Environment." International Journal of Scientific Research in Computer Science and Engineering 5.1 (2017): 45-48.

APA Style Citation: Nitesh Jain, Pradeep Sharma, (2017). A Security Key Management Model for Cloud Environment. International Journal of Scientific Research in Computer Science and Engineering, 5(1), 45-48.

BibTex Style Citation:
@article{Jain_2017,
author = {Nitesh Jain, Pradeep Sharma},
title = {A Security Key Management Model for Cloud Environment},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2017},
volume = {5},
Issue = {1},
month = {2},
year = {2017},
issn = {2347-2693},
pages = {45-48},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=406},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=406
TI - A Security Key Management Model for Cloud Environment
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Nitesh Jain, Pradeep Sharma
PY - 2017
DA - 2017/02/28
PB - IJCSE, Indore, INDIA
SP - 45-48
IS - 1
VL - 5
SN - 2347-2693
ER -

357 Views    299 Downloads    254 Downloads
  
  

Abstract :
Security is the most important factor in cloud computing for ensuring client data is placed on secure mode in the cloud. For any organization, Data is very valuable assets but as number of users and quantity of data is increasing day by day, which cause the need of data security on cloud. For cloud computing there should be various security and privacy measures like identity management, physical personal security, availability, application processing authentication, atomic transaction etc. Security is mostly broken when any one doesn’t follow certain security measure or not being attentive for threat and vulnerabilities. Dealing with “One Cloud” providers is predicted to become minor popular with customers due to risks of service availability failure and the possibility of malicious insiders in the one cloud. In this research paper we have also dealing with a security key management model for cloud environment or cloud of cloud.

Key-Words / Index Term :
Cloud Computing, Security Model, Data Security, Cloud Environment

References :
[1]. S.L. Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.
[2]. R. Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.
[3]. S. Ayyub, D. Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Vol.1, Issue.4, pp.18-22, 2013.
[4]. G.Malini and A.Immaculate Mercy , "Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.277-281, 2015.
[5]. S.Sujitha and S. J. Mohana, "Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.181-184, 2015.
[6]. Md Kausar Alam, Sharmila Banu K, “An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds”, International Journal of Scientific and Research Publications, vol. 3, issue 4, pp.23-28, 2013.
[7]. A. Juels, B.S. Kaliski Jr, "PORs: Proofs of retrievability for large files", CCS `07: Proc. 14th ACM Conf. on Computer and communications security, 2007, pp. 584-597.
[8]. C. Cachin, I. Keidar, A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86.
[9]. H. Abu-Libdeh, L. Princehouse, H. Weatherspoon, "RACS: a case for cloud storage diversity", SoCC`10: Proc. 1st
[10]. Rakesh Prasad Sarang and Rajesh Kumar Bunkar, "Study of Services and Privacy Usage in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.7-12, 2013.
[11] R. Sood, R. Sharma, "Cloud Security Threats and Issues-A Review", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.115-119, 2017.
[12]. F. Rocha and M. Correia, "Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud", Proc. 1stIntl. Workshop of Dependability of Clouds, Data Centers and Virtual Computing Environments, China, pp.129-134, 2011.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation