Threshold Cryptography Based Data Security in Cloud Computing

被引:14
|
作者
Saroj, Sushil Kr [1 ]
Chauhan, Sanjeev Kr [2 ]
Sharma, Aravendra Kr [3 ]
Vats, Sundaram [1 ]
机构
[1] GCET, CSE Dept, Greater Noida, India
[2] MNNIT, CSE Dept, Allahabad, Uttar Pradesh, India
[3] Galgotias Univ, CSE Dept, Greater Noida, India
关键词
Outsourced data; malicious outsiders; access control; authentication; capability list; threshold cryptography;
D O I
10.1109/CICT.2015.149
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data. Some approaches are given to ensure these security requirements but they are lacked in some ways such as violation of data confidentiality due to collusion attack and heavy computation (due to large no keys). To address these issues we propose a scheme that uses threshold cryptography in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key. In this paper, we use capability list to control the access. This scheme not only provides the strong data confidentiality but also reduces the number of keys.
引用
收藏
页码:202 / 207
页数:6
相关论文
共 50 条
  • [1] Cryptography and Data Security in Cloud Computing
    Yan, Zheng
    Deng, Robert H.
    Varadharajan, Vijay
    INFORMATION SCIENCES, 2017, 387 : 53 - 55
  • [2] Cognitive cryptography for data security in cloud computing
    Ogiela, Urszula
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [3] Comparative study of cryptography for cloud computing for data security
    Mathur P.
    Gupta A.K.
    Vashishtha P.
    Recent Advances in Computer Science and Communications, 2021, 14 (05) : 1508 - 1513
  • [4] Designing of Cryptography Based Security System for Cloud Computing
    Sengupta, Nandita
    Holmes, Jeffrey
    2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 52 - 57
  • [5] A Novel Scheme for Data Security in Cloud Computing using Quantum Cryptography
    Sharma, Geeta
    Kalra, Sheetal
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [6] PSR: An Improvement of Lightweight Cryptography Algorithm for Data Security in Cloud Computing
    Chandra, P. Sri Ram
    Rao, p Syamala
    Naresh, K.
    Malladi, Ravisankar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (01) : 1053 - 1058
  • [7] A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
    Adee, Rose
    Mouratidis, Haralambos
    SENSORS, 2022, 22 (03)
  • [8] A Hybrid Cryptography Algorithm for Cloud Computing Security
    Timothy, Divya Prathana
    Santra, Ajit Kumar
    2017 INTERNATIONAL CONFERENCE ON MICROELECTRONIC DEVICES, CIRCUITS AND SYSTEMS (ICMDCS), 2017,
  • [9] Enhancing Data and Privacy Security in Mobile Cloud Computing through Quantum Cryptography
    Han, Jiawei
    Liu, Yanheng
    Sun, Xin
    Song, Lijun
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 398 - 401
  • [10] Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing
    Kumar, Anuj
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1529 - 1535