Threshold Cryptography Based Data Security in Cloud Computing

被引:14
|
作者
Saroj, Sushil Kr [1 ]
Chauhan, Sanjeev Kr [2 ]
Sharma, Aravendra Kr [3 ]
Vats, Sundaram [1 ]
机构
[1] GCET, CSE Dept, Greater Noida, India
[2] MNNIT, CSE Dept, Allahabad, Uttar Pradesh, India
[3] Galgotias Univ, CSE Dept, Greater Noida, India
关键词
Outsourced data; malicious outsiders; access control; authentication; capability list; threshold cryptography;
D O I
10.1109/CICT.2015.149
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data. Some approaches are given to ensure these security requirements but they are lacked in some ways such as violation of data confidentiality due to collusion attack and heavy computation (due to large no keys). To address these issues we propose a scheme that uses threshold cryptography in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key. In this paper, we use capability list to control the access. This scheme not only provides the strong data confidentiality but also reduces the number of keys.
引用
收藏
页码:202 / 207
页数:6
相关论文
共 50 条
  • [21] Improving Data Storage Security in Cloud Environment Using Public Auditing and Threshold Cryptography Scheme
    Suryawanshi, Reshma
    Shelke, Santosh
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [22] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [23] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [24] Security of Big Data Based on the Technology of Cloud Computing
    Zhou, Xiaojun
    Lin, Ping
    Li, Zhiyong
    Wang, Yunpeng
    Tan, Wei
    Huang, Meng
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 703 - 706
  • [25] Cryptography in Cloud Computing
    Deng, Robert H.
    Xiang, Yang
    Au, Man Ho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2014, 30 : 90 - 90
  • [26] A hybrid cryptography technique for data storage on cloud computing
    Bermani, Ali Kadhim
    Murshedi, Tariq A. K.
    Abod, Zaid A.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1613 - 1624
  • [27] Chaos-based Cryptography for Cloud Computing
    Tobin, P.
    Tobin, L.
    Mc Keever, M.
    Blackledge, J.
    2016 27TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2016,
  • [28] Intelligent and semantic threshold schemes for security in cloud computing
    Ogiela, Lidia
    Snasel, Vaclav
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (02):
  • [29] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225
  • [30] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64