Title :
Threshold Cryptography Based Data Security in Cloud Computing
Author :
Saroj, Sushil Kr ; Chauhan, Sanjeev Kr ; Sharma, Aravendra Kr ; Vats, Sundaram
Author_Institution :
CSE Dept., GCET, Noida, India
Abstract :
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data. Some approaches are given to ensure these security requirements but they are lacked in some ways such as violation of data confidentiality due to collusion attack and heavy computation (due to large no keys). To address these issues we propose a scheme that uses threshold cryptography in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key. In this paper, we use capability list to control the access. This scheme not only provides the strong data confidentiality but also reduces the number of keys.
Keywords :
cloud computing; cryptography; data integrity; organisational aspects; cloud computing; computing services; data access control; data confidentiality; data decryption; data integrity; data owner; storage services; threshold cryptography based data security; Access control; Cloud computing; Permission; Public key; Vectors; Outsourced data; access control; authentication; capability list; malicious outsiders; threshold cryptography;
Conference_Titel :
Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
Conference_Location :
Ghaziabad
Print_ISBN :
978-1-4799-6022-4
DOI :
10.1109/CICT.2015.149