Threshold Cryptography Based Data Security in Cloud Computing

被引:14
|
作者
Saroj, Sushil Kr [1 ]
Chauhan, Sanjeev Kr [2 ]
Sharma, Aravendra Kr [3 ]
Vats, Sundaram [1 ]
机构
[1] GCET, CSE Dept, Greater Noida, India
[2] MNNIT, CSE Dept, Allahabad, Uttar Pradesh, India
[3] Galgotias Univ, CSE Dept, Greater Noida, India
关键词
Outsourced data; malicious outsiders; access control; authentication; capability list; threshold cryptography;
D O I
10.1109/CICT.2015.149
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data. Some approaches are given to ensure these security requirements but they are lacked in some ways such as violation of data confidentiality due to collusion attack and heavy computation (due to large no keys). To address these issues we propose a scheme that uses threshold cryptography in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key. In this paper, we use capability list to control the access. This scheme not only provides the strong data confidentiality but also reduces the number of keys.
引用
收藏
页码:202 / 207
页数:6
相关论文
共 50 条
  • [41] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [42] Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing
    Sundar, K.
    Sasikumar, S.
    Jayakumar, C.
    Nagarajan, D.
    Karthick, S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (27) : 42817 - 42832
  • [43] KEY TECHNOLOGY OF HOSPITAL DATA SECURITY BASED ON CLOUD COMPUTING
    Zhang, Y.
    Meng, Q. W.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2015, 117 : 38 - 38
  • [44] A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    Khan, Atta Ur Rehman
    2013 IEEE SYMPOSIUM ON WIRELESS TECHNOLOGY & APPLICATIONS (ISWTA2013), 2013, : 62 - 67
  • [45] Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing
    K. Sundar
    S. Sasikumar
    C. Jayakumar
    D. Nagarajan
    S. karthick
    Multimedia Tools and Applications, 2023, 82 : 42817 - 42832
  • [46] A new data collaboration service based on cloud computing security
    Ren Ying
    Li Hua-Wei
    Wang Lina
    2017 3RD INTERNATIONAL CONFERENCE ON APPLIED MATERIALS AND MANUFACTURING TECHNOLOGY (ICAMMT 2017), 2017, 242
  • [47] A novel security mechanism using AES cryptography approach in cloud computing
    Muthulakshmi, B.
    Venkatesulu, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (06)
  • [48] Towards DNA based data security in the cloud computing environment
    Namasudra, Suyel
    Devi, Debashree
    Kadry, Seifedine
    Sundarasekar, Revathi
    Shanthini, A.
    COMPUTER COMMUNICATIONS, 2020, 151 : 539 - 547
  • [49] Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography
    Ahamed, N. Niyaz
    Duraipandian, N.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01): : 83 - 94
  • [50] Use of Cryptography in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    2013 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2013), 2013, : 179 - 184