Article citationsMore >>

D. X. Song, D. Wagner, A. Perrig. “Practical techniques for searches on encrypted data”. Proceedings of the IEEE Symposium on Security and Privacy, 2000, pp. 44-55.

has been cited by the following article:

Article

DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds

1M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology, Indore, India


Journal of Computer Sciences and Applications. 2015, Vol. 3 No. 3, 73-78
DOI: 10.12691/jcsa-3-3-3
Copyright © 2015 Science and Education Publishing

Cite this paper:
Shyam Nandan Kumar. DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds. Journal of Computer Sciences and Applications. 2015; 3(3):73-78. doi: 10.12691/jcsa-3-3-3.

Correspondence to: Shyam  Nandan Kumar, M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology, Indore, India. Email: shyamnandan.mec@gmail.com

Abstract

With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the Cloud, share a large amount of data day by day. Secure Data sharing is an important issue over the cloud environment. In order to enhance the security services, the paper proposes Decentralized Cryptography Technique for Secure Communication over the Clouds. In this paper, Cryptography Model for Secure Data Sharing over Cloud is presented first. Cryptography Management Approach is given to access the secure resource over cloud and then Algorithm Design Methodology is provided in decentralized manner. The paper also provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing.

Keywords