Data Security In Cloud Using Semi Trusted Third Party Key Manager

Authors

  • M. Akhila  Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • E. Hemalatha  Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • S. Parvathi  Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • Karthikeyan. L  Department of Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Keywords:

ABE, RSA, Diffie-Hellman, Elgammal, DES, Shamir(k,n) Techniques

Abstract

In our project Off-site data loading is an request of cloud that releases the clients from focusing happening data storing scheme. However, subcontracting facts to a third-party directorial switch involves grave security concerns. Data leak might occur owing to bouts by additional operators and tackles in the cloud. Wide of facts by cloud ability worker is yet another problem that is met in the cloud location. Thus, top of security events is requiring. In this paper, we offer Data Safety for Cloud Setting with Semi Trusted Third Party (DaSCE), a data security system that provides (a) key management (b) access control, and (c) file assured deletion. The DaSCE utilizes Shamir’s (k, n) threshold scheme to manage the keys where k out of n shares are required to generate the key.

References

  1. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Ktaz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoics, and M. Zaharia, “A View of Cloud Computing” Communications of ACM, Vol. 53, No. 4, 2010, pp.50-58
  2. M. S. Blumenthal, “Is Security Lost in the Clouds?”Communication and Strategies, No. 81, 2011, pp. 69-86.
  3. C.Cachin-+and M.Schunter, "A cloud you can trust," IEEE Spectrum,Vol. 48,No. 12, 2011,pp. 28-51.
  4. C.Cremer’s, "The Scyther Tool: Verification, falsification and analysis of security protocols." In Computer Aided Verification, Springe Berlin Heidelberg,2008,pp.414-418
  5. Cloud Security Alliance http://downloads.cloudsecurityalliance .org/initiatives/cdg/CSA_ CCAQIS_ Survey.pd f (accessed March 24, 2013).
  6. W. Diffie, P. C. V. Oorschot, and M. J. Wiener, “Authentication and authenticated key exchanges,” Designs, Codes and Cryptography, Vol. 2, No. 2, 1992, pp. 107-125.
  7. M. Ali, K. Bilal, S. U. Khan, B. Veeravalli, K. Li, and A. Y. Zomaya, “DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security,” IEEE Transactions on Cloud Computing, 2015,DOI:10.1109/TCC.2015. 2400460
  8. N. En and N. Srensson, “An extensible SAT-solver,”Lecture Notes Computer Science, vol. 2919, Springer, 2003, pp. 502-518.
  9. C P. Gomes, H. Kautz, A. Sabharwal, “Satisfia-bility solvers,” In Handbook Of Knowledge Representation, Elsevier, 2007.
  10. M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: Opportunities and challenges,” Information Sciences, Vol. 305, 2015, pp. 357-383.
  11. A. Juels and A. Opera, “New Approaches to security and Availability for cloud data,” Communications of the ACM, Vol. 56, No. 2, 2013, pp. 64-73.

Downloads

Published

2016-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. Akhila, E. Hemalatha, S. Parvathi, Karthikeyan. L, " Data Security In Cloud Using Semi Trusted Third Party Key Manager, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 2, Issue 2, pp.111-113, March-April-2016.