Cloud Based Secure Data Segmentation Techniques

Amit R Gadekar, M. V. Sarode, Dr. V. M. Thakare


In cloud computing, the data transmission done between the cloud server and customer resources, Cloud’s data safty is the current discussion in the IT community. This study paper helps to protect data without affecting from original one  to prevent unauthorized data access from cloud server, the data which is at the server side has an user’s first choice to be protected by safe manner, so that the interested data is  on  highly secure priority. In this technique, data is segmented into three different levels based upon the level of data importance   set by the data owner.  In each level of the data stored before    the cloud may  be  used  encryption  /decryption  algorithm  and a key to encrypt the data. In this technology, the goal is to maintain data in a safe and secure manner to avoid theft , loss   of control and secure from different attacks. In addition, it can also reduce the time and cost of encrypted information that to   be kept safly on the  cloud.  In  order  to  test  the  performance of the model, this paper will conduct performance analysis by implementing Elliptic Curve Cryptography ( ECC ). Keywords: Cloud Computing, , Decryption, Elliptical Curve Cryptography, Encryption, Segmentation

Full Text:



Hassan Takabi James B.D. Joshi, ”Security and Privacy Challenges in Cloud Computing Environments,”. IEEE Security Privacy Volume: 8, Issue: 6, Nov.-Dec. 2010

Farzad Sabahi, ”Cloud Computing Security Threats and Responses,”. Communication Software and Networks (ICCSN), IEEE 3rd International Conference 2011.

Ashish Agarwal, Aparna Agarwal,”The Security Risks Associated with Cloud Computing,” International Journal of Computer Applications in Engineering Sciences ,VOL I, SPECIAL ISSUE ON CNS, ISSN: 2231- 4946 ,JULY 2011.

Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, Shiv Shakti Shrivastava,”Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environmen,”. Software Engineering (CONSEG), CSI Sixth International Conference,

Sept. 2012

M.Venkatesh, M.R.Sumalatha, Mr.C.SelvaKumar ,”Improving Public Auditability, Data Possession in Data Storage Security for Cloud Computing,” Recent Trends In Information Technology (ICRTIT), International Conference, April 2012

Prashant Rewagad, Yogita Pawar ,”Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing,” International Conference on Communica- tion Systems and Network Technologies 2013.

Kuyoro S. O, Ibikunle.F and Awodele O, ”Challenges and Security Issues in Cloud Computing,” International Journal of Computer Networks, Vol. 3, No. 5, 2011 pp. 247-255,

Aderemi A. Atayero, Oluwaseyi Feyisetan , ”Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption,” Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 10, October 2011

[9] Hai Yan, Zhijie Jerry Shi. ,” Software Implementations of Elliptic Curve Cryptography. Information Technology: New Generations,” Third International Conference, April 2006.


Copyright © IJETT, International Journal on Emerging Trends in Technology