Threshold Cryptography Based Data Security in Cloud Computing

被引:14
|
作者
Saroj, Sushil Kr [1 ]
Chauhan, Sanjeev Kr [2 ]
Sharma, Aravendra Kr [3 ]
Vats, Sundaram [1 ]
机构
[1] GCET, CSE Dept, Greater Noida, India
[2] MNNIT, CSE Dept, Allahabad, Uttar Pradesh, India
[3] Galgotias Univ, CSE Dept, Greater Noida, India
来源
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015 | 2015年
关键词
Outsourced data; malicious outsiders; access control; authentication; capability list; threshold cryptography;
D O I
10.1109/CICT.2015.149
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data. Some approaches are given to ensure these security requirements but they are lacked in some ways such as violation of data confidentiality due to collusion attack and heavy computation (due to large no keys). To address these issues we propose a scheme that uses threshold cryptography in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key. In this paper, we use capability list to control the access. This scheme not only provides the strong data confidentiality but also reduces the number of keys.
引用
收藏
页码:202 / 207
页数:6
相关论文
共 50 条
  • [1] Cognitive cryptography for data security in cloud computing
    Ogiela, Urszula
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18)
  • [2] Improving Data Storage Security in Cloud Environment Using Public Auditing and Threshold Cryptography Scheme
    Suryawanshi, Reshma
    Shelke, Santosh
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [3] Security Techniques for Data Protection in Cloud Computing
    Jakimoski, Kire
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (01): : 49 - 56
  • [4] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [5] Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    Sankaran, K. Sakthidasan
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1031 - 1035
  • [6] Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
    Yang, Ching-Nung
    Lai, Jia-Bin
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 259 - 266
  • [7] Security Issues for Cloud Computing
    Hamlen, Kevin
    Kantarcioglu, Murat
    Khan, Latifur
    Thuraisingham, Bhavani
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (02) : 36 - 48
  • [8] A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
    Sutradhar, Mukti Rani
    Sultana, Nigar
    Dey, Himel
    Arif, Hossain
    2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 239 - 244
  • [9] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [10] Privacy preserving model-based authentication and data security in cloud computing
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 173 - 190