Secure Mechanisms for Key Shares in Cloud Computing
The protection of the key is important due to the vulnerabilities which exist in cloud computing. In this article, algorithms and techniques for protection of the key in cloud computing are proposed. The algorithms to select the number of virtual machines is presented to protect the key. The existing key management algorithm is modified to address the key leakage issue. The novel techniques such as validation of key shares and key share resharing are introduced and analyzed for protection of the key. These techniques make the attackers incompetence to reconstruct the key. Further, for immediate access of protected resources, key reconstruction for key sizes of a cryptographic algorithm is also analyzed.
Year of publication: |
2018
|
---|---|
Authors: | Buchade, Amar ; Ingle, Rajesh |
Published in: |
International Journal of Rough Sets and Data Analysis (IJRSDA). - IGI Global, ISSN 2334-4601, ZDB-ID 2798043-1. - Vol. 5.2018, 3 (01.07.), p. 21-41
|
Publisher: |
IGI Global |
Subject: | Hash | Key Management | Key Protection | Key Reconstruction | Key Share Validation | Multi Cloud Architecture | Secret Sharing Algorithms | Security Analysis | Threshold Cryptography |
Saved in:
Saved in favorites
Similar items by subject
-
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN
Yassine, Maleh, (2016)
-
An Economic Analysis of Blockchains
Waelbroeck, Patrick, (2018)
-
Keyframe-Based Vehicle Surveillance Video Retrieval
Liu, Xiaoxi, (2018)
- More ...