DATA SECURITY IN CLOUD COMPUTING BASED ON HOMOMORPHIC ENCRYPTION - ENHANCED SECRET SHARING KEY MANAGEMENT SCHEME
Cloud computing is a concept which is being implemented worldwide and the cloud has no borders. Â Computers that are used to process and store the data can be located anywhere in the world. These locations depend on where the required capacities are available across the globe. Many organizations use cloud storage for storing their critical information due to the attractive features of cloud computing. The sensitive data can be remotely stored by the users in the cloud and accessed by using thin clients whenever required. Data Security in cloud computing is regarded as one of the major issues in the cloud today. It can be risky to store data in the cloud because of the use of the internet by cloud-based services which means less control over the data. Grabbing all the benefits of the cloud as well as maintaining data security controls over the organizational assets is regarded as one of the major concerns of the cloud. We aim to propose a more reliable, decentralized light weight key management technique for cloud-based systems that provide more efficient data security using Homomorphic encryptions and key management in cloud-based systems. The technique that we proposed provides better security against byzantine failure, server colluding and data modification attacks.
Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing (draft)." NIST special publication 800.145 (2011): 7.
Jaydeep. "Security and Security and Privacy Privacy Privacy Issues in Cloud Computing." http://arxiv.org/.
"Cloud Computing Architecture" http://communication.howstu works.com/cloud -computingl.htm.
Brodkin, Jon. "Gartner: Seven cloud-computing security risks." Infoworld (2008): 1-3.
Calheiros, Rodrigo N., et al. "Cloudsim: A novel framework for modeling and simulation of cloud computing infrastructures and services." arXiv preprint arXiv:0903.2525 (2009).
Ogbu, Richard Chukwu, and Ifeanyi Ugbaga Nkole. "Cloud Computing: A review."
Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612-613.
Liu, C.L. Introduction to Combinatorial Mathematics. McGraw- Hill, New York, 1968.
Damgrd, Ivan, et al. "Secure key management in the cloud." Cryptography and Coding. Springer Berlin Heidelberg, 2013. 270-289.
Mazieres, David, et al. "Separating key management from file system security." ACM SIGOPS Operating Systems Review 33.5 (1999): 124-139
Asmuth, Charles, and John Bloom. "A modular approach to key safeguarding." IEEE transactions on information theory 30.2 (1983): 208-210.
Chandramouli, Ramaswamy, Michaela Iorga, and Santosh Chokhani. Cryptographic Key Management Issues and Challenges in Cloud Services. Springer New York, 2014.
Almorsy, Mohamed, John Grundy, and Ingo Mller. "An analysis of the cloud computing security problem." the proc. of the 2010 Asia Pacic Cloud Work-shop, Colocated with APSEC2010, Australia. 2010.
Rafaeli, Sandro, and David Hutchison. "A survey of key management for secure group communication." ACM Computing Surveys (CSUR) 35.3 (2003): 309-329.
Kalyani M. ."Cloud Security: Efficient and Reliable Encryption Key Manage-ment Crucial for Data Protection". https://spideroak.com/privacypost/cloud-security/secure-encryption-key-management-in-the-cloud/
Blakley, George Robert. "Safeguarding cryptographic keys." Managing Requirements Knowledge, International Workshop on. IEEE Computer Society, 1899.
Vukolic, Marko. "The Byzantine empire in the intercloud." ACM SIGACT News 41.3 (2010): 105-111.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.