Abstract
In cloud environment, the owner may store insightful data of their organization in cloud storage. The cloud service provider should guarantee integrity, security, access control and confidentiality about the stored data at cloud. Most of the organizations pay no attention to the insider attack because it is harder to detect and mitigate. This is a major emerging problem in organizations. In cryptographic systems, an important element is threshold cryptography which secures the keys. Rather storing it at a single server, it is divided and distributed among the different entities of the system. As cloud security has still open challenges toward file sharing and data protection, this paper aims to design a new automated keyword formation mechanism using various techniques of natural language processing. The secret key is defined by this keyword. This secret key is then distributed among the users. The designed mechanism ensures the uniqueness of the key share and reconstruction process of secret using appropriate threshold value so that the authorized user can only decrypt and access the file.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Geer, D.E., Yung, M.: Split-and-delegate: threshold cryptography for the masses. In: Blaze, M. (ed.) Financial Cryptography. FC 2002. LNCS, vol. 2357, pp. 220–237. Springer, Berlin, Heidelberg (2003)
Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based cryptographic data access control in cloud computing. Int. J. Adv. Netw. Appl. 3(3), 1151–1161 (2011)
Sathishkumar, R., Ramesh, C.: A modified method for preventing black-hole attack in mobile ad hoc networks. J. Eng. Appl. Sci. 11(2), 182–191 (2016)
Saroj, S.K., Chauhan, S.K., Sharma, A.K., Vats, S.: Threshold cryptography based data security in cloud computing. In: 2015 IEEE International Conference on Computational Intelligence and Communication Technology, pp. 202–207. Ghaziabad (2015)
Recommendation for key management Part1: General (Revised), NIST SP 800-57.: NIST Special Publication, Special Publication 800-57 (2007)
Gharib, H., Belloulata, K.: Authentication architecture using threshold cryptography in kerberos for mobile ad hoc networks. Adv. Sci. Technol. Res. J. 8, 12–18 (2014)
Xu S., Yung M.: The dark side of threshold cryptography. In: Blaze, M. (ed.) Financial Cryptography. FC 2002. LNCS, vol. 2357, pp. 198–219. Springer, Berlin, Heidelberg (2003)
Naidu, D., Kosare, D.: (2017): Implementing data security using odd-even threshold cryptography in cloud computing–a review. Int. J. Adv. Comput. Electron. Technol. 4(2), 6–9 (2017)
Naidu, D., Kosare, D.: Data security using odd-even threshold cryptography in cloud computing. J. Eng. Appl. Sci. 12(12), 9490–9495 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Naidu, D., Tirpude, S., Bongirwar, V. (2020). Novel Idea of Unique Key Generation and Distribution Using Threshold Science to Enhance Cloud Security. In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_39
Download citation
DOI: https://doi.org/10.1007/978-981-15-0077-0_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0076-3
Online ISBN: 978-981-15-0077-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)