Online Submission!

Open Journal Systems


Ashwath S, Aravind K R, Joshua Jacob


Cloud computing is a concept which is being implemented worldwide and the cloud has no borders.  Computers that are used to process and store the data can be located anywhere in the world. These locations depend on where the required capacities are available across the globe. Many organizations use cloud storage for storing their critical information due to the attractive features of cloud computing. The sensitive data can be remotely stored by the users in the cloud and accessed by using thin clients whenever required. Data Security in cloud computing is regarded as one of the major issues in the cloud today. It can be risky to store data in the cloud because of the use of the internet by cloud-based services which means less control over the data. Grabbing all the benefits of the cloud as well as maintaining data security controls over the organizational assets is regarded as one of the major concerns of the cloud. We aim to propose a more reliable, decentralized light weight key management technique for cloud-based systems that provide more efficient data security using Homomorphic encryptions and key management in cloud-based systems. The technique that we proposed provides better security against byzantine failure, server colluding and data modification attacks.

Full Text:



Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing (draft)." NIST special publication 800.145 (2011): 7.

Jaydeep. "Security and Security and Privacy Privacy Privacy Issues in Cloud Computing."

"Cloud Computing Architecture" http://communication.howstu -computingl.htm.

Brodkin, Jon. "Gartner: Seven cloud-computing security risks." Infoworld (2008): 1-3.

Calheiros, Rodrigo N., et al. "Cloudsim: A novel framework for modeling and simulation of cloud computing infrastructures and services." arXiv preprint arXiv:0903.2525 (2009).

Ogbu, Richard Chukwu, and Ifeanyi Ugbaga Nkole. "Cloud Computing: A review."

Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612-613.

Liu, C.L. Introduction to Combinatorial Mathematics. McGraw- Hill, New York, 1968.

Damgrd, Ivan, et al. "Secure key management in the cloud." Cryptography and Coding. Springer Berlin Heidelberg, 2013. 270-289.

Mazieres, David, et al. "Separating key management from file system security." ACM SIGOPS Operating Systems Review 33.5 (1999): 124-139

Asmuth, Charles, and John Bloom. "A modular approach to key safeguarding." IEEE transactions on information theory 30.2 (1983): 208-210.

Chandramouli, Ramaswamy, Michaela Iorga, and Santosh Chokhani. Cryptographic Key Management Issues and Challenges in Cloud Services. Springer New York, 2014.

Almorsy, Mohamed, John Grundy, and Ingo Mller. "An analysis of the cloud computing security problem." the proc. of the 2010 Asia Pacic Cloud Work-shop, Colocated with APSEC2010, Australia. 2010.

Rafaeli, Sandro, and David Hutchison. "A survey of key management for secure group communication." ACM Computing Surveys (CSUR) 35.3 (2003): 309-329.

Kalyani M. ."Cloud Security: Efficient and Reliable Encryption Key Manage-ment Crucial for Data Protection".

Blakley, George Robert. "Safeguarding cryptographic keys." Managing Requirements Knowledge, International Workshop on. IEEE Computer Society, 1899.

Vukolic, Marko. "The Byzantine empire in the intercloud." ACM SIGACT News 41.3 (2010): 105-111.



  • There are currently no refbacks.

Copyright (c) 2017 An International Journal of Advanced Computer & Engineering Technology