DocumentCode :
2344132
Title :
Threshold Cryptography Based Data Security in Cloud Computing
Author :
Saroj, Sushil Kr ; Chauhan, Sanjeev Kr ; Sharma, Aravendra Kr ; Vats, Sundaram
Author_Institution :
CSE Dept., GCET, Noida, India
fYear :
2015
fDate :
13-14 Feb. 2015
Firstpage :
202
Lastpage :
207
Abstract :
Cloud computing is very popular in organizations and institutions because it provides storage and computing services at very low cost. However, it also introduces new challenges for ensuring the confidentiality, integrity and access control of the data. Some approaches are given to ensure these security requirements but they are lacked in some ways such as violation of data confidentiality due to collusion attack and heavy computation (due to large no keys). To address these issues we propose a scheme that uses threshold cryptography in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key. In this paper, we use capability list to control the access. This scheme not only provides the strong data confidentiality but also reduces the number of keys.
Keywords :
cloud computing; cryptography; data integrity; organisational aspects; cloud computing; computing services; data access control; data confidentiality; data decryption; data integrity; data owner; storage services; threshold cryptography based data security; Access control; Cloud computing; Permission; Public key; Vectors; Outsourced data; access control; authentication; capability list; malicious outsiders; threshold cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on
Conference_Location :
Ghaziabad
Print_ISBN :
978-1-4799-6022-4
Type :
conf
DOI :
10.1109/CICT.2015.149
Filename :
7078695
Link To Document :
بازگشت