Threshold Cryptography Based Data Security in Cloud Computing

被引:14
|
作者
Saroj, Sushil Kr [1 ]
Chauhan, Sanjeev Kr [2 ]
Sharma, Aravendra Kr [3 ]
Vats, Sundaram [1 ]
机构
[1] GCET, CSE Dept, Greater Noida, India
[2] MNNIT, CSE Dept, Allahabad, Uttar Pradesh, India
[3] Galgotias Univ, CSE Dept, Greater Noida, India
关键词
Outsourced data; malicious outsiders; access control; authentication; capability list; threshold cryptography;
D O I
10.1109/CICT.2015.149
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data. Some approaches are given to ensure these security requirements but they are lacked in some ways such as violation of data confidentiality due to collusion attack and heavy computation (due to large no keys). To address these issues we propose a scheme that uses threshold cryptography in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key. In this paper, we use capability list to control the access. This scheme not only provides the strong data confidentiality but also reduces the number of keys.
引用
收藏
页码:202 / 207
页数:6
相关论文
共 50 条
  • [31] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [32] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
    Garg, Priyansha
    Sharma, Moolchand
    Agrawal, Shivani
    Kumar, Yastika
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
  • [33] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [34] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [35] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [36] Modeling of Data Security in Cloud Computing
    Balogh, Zoltan
    Turcani, Milan
    2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 940 - 945
  • [37] An Overview on Data Security in Cloud Computing
    Kacha, Lynda
    Zitouni, Abdelhafid
    CYBERNETICS APPROACHES IN INTELLIGENT SYSTEMS: COMPUTATIONAL METHODS IN SYSTEMS AND SOFTWARE 2017, VOL. 1, 2018, 661 : 250 - 261
  • [38] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [39] A Study in Data Security in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    Majid, Mazlina Binti Abdul
    Khan, Nusrat Ullah
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 367 - 371
  • [40] Cloud Computing, Security and Data Concealment
    Delettre, Christian
    Boudaoud, Karima
    Riveill, Michel
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,