Home > Archives > IJSRST16227
Data Security In Cloud Using Semi Trusted Third Party Key Manager
Authors(4) :-M. Akhila, E. Hemalatha, S. Parvathi, Karthikeyan. L
In our project Off-site data loading is an request of cloud that releases the clients from focusing happening data storing scheme. However, subcontracting facts to a third-party directorial switch involves grave security concerns. Data leak might occur owing to bouts by additional operators and tackles in the cloud. Wide of facts by cloud ability worker is yet another problem that is met in the cloud location. Thus, top of security events is requiring. In this paper, we offer Data Safety for Cloud Setting with Semi Trusted Third Party (DaSCE), a data security system that provides (a) key management (b) access control, and (c) file assured deletion. The DaSCE utilizes Shamir’s (k, n) threshold scheme to manage the keys where k out of n shares are required to generate the key.
M. Akhila, E. Hemalatha, S. Parvathi, Karthikeyan. L
ABE, RSA, Diffie-Hellman, Elgammal, DES, Shamir(k,n) Techniques
- M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Ktaz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoics, and M. Zaharia, “A View of Cloud Computing” Communications of ACM, Vol. 53, No. 4, 2010, pp.50-58
- M. S. Blumenthal, “Is Security Lost in the Clouds?”Communication and Strategies, No. 81, 2011, pp. 69-86.
- C.Cachin-+and M.Schunter, "A cloud you can trust," IEEE Spectrum,Vol. 48,No. 12, 2011,pp. 28-51.
- C.Cremer’s, "The Scyther Tool: Verification, falsification and analysis of security protocols." In Computer Aided Verification, Springe Berlin Heidelberg,2008,pp.414-418
- Cloud Security Alliance http://downloads.cloudsecurityalliance .org/initiatives/cdg/CSA_ CCAQIS_ Survey.pd f (accessed March 24, 2013).
- W. Diffie, P. C. V. Oorschot, and M. J. Wiener, “Authentication and authenticated key exchanges,” Designs, Codes and Cryptography, Vol. 2, No. 2, 1992, pp. 107-125.
- M. Ali, K. Bilal, S. U. Khan, B. Veeravalli, K. Li, and A. Y. Zomaya, “DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security,” IEEE Transactions on Cloud Computing, 2015,DOI:10.1109/TCC.2015. 2400460
- N. En and N. Srensson, “An extensible SAT-solver,”Lecture Notes Computer Science, vol. 2919, Springer, 2003, pp. 502-518.
- C P. Gomes, H. Kautz, A. Sabharwal, “Satisfia-bility solvers,” In Handbook Of Knowledge Representation, Elsevier, 2007.
- M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: Opportunities and challenges,” Information Sciences, Vol. 305, 2015, pp. 357-383.
- A. Juels and A. Opera, “New Approaches to security and Availability for cloud data,” Communications of the ACM, Vol. 56, No. 2, 2013, pp. 64-73.
Published in : Volume 2 | Issue 2 | March-April 2016
Date of Publication : 2016-04-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 111-113
Manuscript Number : IJSRST16227
Publisher : Technoscience Academy
PRINT ISSN : 2395-6011
ONLINE ISSN : 2395-602X
Cite This Article :
M. Akhila, E. Hemalatha, S. Parvathi, Karthikeyan. L, "Data Security In Cloud Using Semi Trusted Third Party Key Manager", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 2, Issue 2, pp.111-113, March-April-2016
URL : http://ijsrst.com/IJSRST16227