Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(230.05KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Multi-part Dynamic Key Generation For Secure Data Encryption
Srivatsan R Iyer, Tejas Arackal
Pages - 37 - 46     |    Revised - 10-09-2014     |    Published - 10-10-2014
Published in International Journal of Security (IJS)
Volume - 8   Issue - 4    |    Publication Date - October 2014  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Encryption, Dynamic Key Generation, Data At Rest Security, CRUD.
ABSTRACT
Storage of user or application-generated user-specific private, confidential data on a third party storage provider comes with its own set of challenges. Although such data is usually encrypted while in transit, securely storing such data at rest presents unique security challenges. The first challenge is the generation of encryption keys to implement the desired threat containment. The second challenge is secure storage and management of these keys. This can be accomplished in several ways. A naive approach can be to trust the boundaries of a secure network and store the keys within these bounds in plain text. A more sophisticated method can be devised to calculate or infer the encryption key without explicitly storing it. This paper focuses on the latter approach. Additionally, the paper also describes the implementation of a system that in addition to exposing a set of REST APIs for secure CRUD operations also provides a means for sharing the data among specific users.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
A. Patel and M. Kumar. (2013, Apr.). “A Proposed Model for Data Security of Cloud Storage Using Trusted Platform Module.” International Journal of Advanced Research in Computer Science and Software Engineering. [On-line]. 3(4), pp. 862-866. Available: http://www.ijarcsse.com/docs/papers/Volume_3/4_April2013/V3I4-0430.pdf [Aug. 10, 2014].
E. McCallister, T. Grance, K. Scarfone. “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII).” Internet: http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf, Apr. 2010 [Sep 30, 2014].
OpenStack. “KeyManager” Internet: https://wiki.openstack.org/wiki/KeyManager, Apr. 23, 2013 [Sep. 28, 2014].
OpenStack. “Object Encryption: Extending Swift.” Internet: https://wiki.openstack.org/wiki/ObjectEncryption, Jul. 8, 2013 [Aug. 10, 2014].
OwnCloud. “ownCloud Administrators Manual” Internet: http://doc.owncloud.org/server/6.0/admin_manual/configuration/configuration_encryption.html Sep 9, 2014 [Sep . 28, 2014].
T. Howes. (1995, Jul.). “The Lightweight Directory Access Protocol: X.500 Lite.” CITI Technical Report. [On-line]. 95(8), pp. 1-9. Available: http://www.openldap.org/pub/umich/ldap.pdf [Aug. 10, 2014].
Taylor, N.E., Ives, Z.G. “Reliable storage and querying for collaborative data sharing systems.” in Proc. International Conference on Data Engineering (ICDE), 2010, pp. 40-51.
Trusted Computing Group. “TCG Specification Architecture Overview.” Internet: http://www.trustedcomputinggroup.org/files/resource_files/AC652DE1-1D09-3519- ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview.pdf, Aug. 2, 2007 [Aug. 10, 2014].
MANUSCRIPT AUTHORS
Mr. Srivatsan R Iyer
Webshar LLC - India
srivatsan.iyer.1990@gmail.com
Mr. Tejas Arackal
TCS TataCapital - India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions