Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing

被引:11
作者
Fatima, Shahin [1 ]
Ahmad, Shish [1 ]
机构
[1] Integral Univ, Lucknow, Uttar Pradesh, India
关键词
Cloud Computing; Encryption; Interpolating Polynomial; Newton Divided Difference; Privacy; Security; Shamir Secret Sharing; Threshold Generation;
D O I
10.4018/IJeC.2020010101
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a crucial problem in Cloud computing. Storing and accessing the data in the Cloud is very popular nowadays but the security of data is still lagging behind. Secret sharing schemes are widely used to improve the security of data. In this article, a threshold secret sharing scheme using Newton divided difference interpolating polynomial (TSSNIP) is proposed in a distributed Cloud environment to enhance security of keys used for encryption. The proposed method uses a Newton divided difference interpolating polynomial for key splitting and key reconstruction. A threshold value is used to reconstruct the shares in secret sharing schemes. The proposed work made use of dynamic and random threshold generation method to ensure security of key. The experimental output shows reduced execution time, better security, efficiency, and robustness in the proposed scheme. Furthermore, the proposed scheme also outperformed other secret sharing schemes.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 22 条
[1]  
Alapati K.K., 2018, GROUP ORIENTED SECRE
[2]   Barycentric Lagrange interpolation [J].
Berrut, JP ;
Trefethen, LN .
SIAM REVIEW, 2004, 46 (03) :501-517
[3]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[4]   Accurate evaluation of divided differences for polynomial interpolation of exponential propagators [J].
Caliari, M. .
COMPUTING, 2007, 80 (02) :189-201
[5]   Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing [J].
Chen, Xiu-Bo ;
Sun, Yi-Ru ;
Xu, Gang ;
Yang, Yi-Xian .
INFORMATION SCIENCES, 2019, 501 :172-181
[6]  
Das B, 2016, INT J MATH TRENDS TE, V35
[7]  
Feldman P., 1987, 28th Annual Symposium on Foundations of Computer Science (Cat. No.87CH2471-1), P427, DOI 10.1109/SFCS.1987.4
[8]  
Guo C, 2015, MULTIMEDIA TOOLS APP
[9]   Verifiable secret sharing based on the Chinese remainder theorem [J].
Harn, Lein ;
Miao Fuyou ;
Chang, Chin-Chen .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) :950-957
[10]   SSeCloud: Using secret sharing scheme to secure keys [J].
Hu, Liang ;
Huang, Yang ;
Yang, Disheng ;
Zhang, Yuzhen ;
Liu, Hengchang .
2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81