Skip to main content

Novel Idea of Unique Key Generation and Distribution Using Threshold Science to Enhance Cloud Security

  • Conference paper
  • First Online:
Smart Trends in Computing and Communications

Abstract

In cloud environment, the owner may store insightful data of their organization in cloud storage. The cloud service provider should guarantee integrity, security, access control and confidentiality about the stored data at cloud. Most of the organizations pay no attention to the insider attack because it is harder to detect and mitigate. This is a major emerging problem in organizations. In cryptographic systems, an important element is threshold cryptography which secures the keys. Rather storing it at a single server, it is divided and distributed among the different entities of the system. As cloud security has still open challenges toward file sharing and data protection, this paper aims to design a new automated keyword formation mechanism using various techniques of natural language processing. The secret key is defined by this keyword. This secret key is then distributed among the users. The designed mechanism ensures the uniqueness of the key share and reconstruction process of secret using appropriate threshold value so that the authorized user can only decrypt and access the file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Geer, D.E., Yung, M.: Split-and-delegate: threshold cryptography for the masses. In: Blaze, M. (ed.) Financial Cryptography. FC 2002. LNCS, vol. 2357, pp. 220–237. Springer, Berlin, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based cryptographic data access control in cloud computing. Int. J. Adv. Netw. Appl. 3(3), 1151–1161 (2011)

    Google Scholar 

  3. Sathishkumar, R., Ramesh, C.: A modified method for preventing black-hole attack in mobile ad hoc networks. J. Eng. Appl. Sci. 11(2), 182–191 (2016)

    Google Scholar 

  4. Saroj, S.K., Chauhan, S.K., Sharma, A.K., Vats, S.: Threshold cryptography based data security in cloud computing. In: 2015 IEEE International Conference on Computational Intelligence and Communication Technology, pp. 202–207. Ghaziabad (2015)

    Google Scholar 

  5. Recommendation for key management Part1: General (Revised), NIST SP 800-57.: NIST Special Publication, Special Publication 800-57 (2007)

    Google Scholar 

  6. Gharib, H., Belloulata, K.: Authentication architecture using threshold cryptography in kerberos for mobile ad hoc networks. Adv. Sci. Technol. Res. J. 8, 12–18 (2014)

    Google Scholar 

  7. Xu S., Yung M.: The dark side of threshold cryptography. In: Blaze, M. (ed.) Financial Cryptography. FC 2002. LNCS, vol. 2357, pp. 198–219. Springer, Berlin, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Naidu, D., Kosare, D.: (2017): Implementing data security using odd-even threshold cryptography in cloud computing–a review. Int. J. Adv. Comput. Electron. Technol. 4(2), 6–9 (2017)

    Google Scholar 

  9. Naidu, D., Kosare, D.: Data security using odd-even threshold cryptography in cloud computing. J. Eng. Appl. Sci. 12(12), 9490–9495 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Devishree Naidu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Naidu, D., Tirpude, S., Bongirwar, V. (2020). Novel Idea of Unique Key Generation and Distribution Using Threshold Science to Enhance Cloud Security. In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_39

Download citation

Publish with us

Policies and ethics