Security enhancement in cloud environment using secure secret key sharing

Securing the data in distributed cloud system is considered one of the major concern for the cloud customers who faces security risks. The data leakage or data tampering are widely used by attackers to extract the private information of other users who shares the confidential data through virtualiza...

Full description

Permalink: http://skupnikatalog.nsk.hr/Record/nsk.NSK01001102343/Details
Matična publikacija: Journal of communications software and systems (Online)
16 (2020), 4 ; str. 296-307
Glavni autori: Chhabra, Sakshi (Author), Kumar Singh, Ashutosh
Vrsta građe: e-članak
Jezik: eng
Predmet:
Online pristup: https://doi.org/10.24138/jcomss.v16i3.964
Journal of communications software and systems (Online)
Hrčak
LEADER 03081naa a22003614i 4500
001 NSK01001102343
003 HR-ZaNSK
005 20210721133455.0
006 m d
007 cr||||||||||||
008 210527s2020 ci | |0|| ||eng
024 7 |2 doi  |a 10.24138/jcomss.v16i3.964 
035 |a (HR-ZaNSK)001102343 
040 |a HR-ZaNSK  |b hrv  |c HR-ZaNSK  |e ppiak 
041 0 |a eng  |b eng 
042 |a croatica 
044 |a ci  |c hr 
080 1 |a 004  |2 2011 
100 1 |a Chhabra, Sakshi  |4 aut  |9 HR-ZaNSK 
245 1 0 |a Security enhancement in cloud environment using secure secret key sharing  |h [Elektronička građa] /  |c Sakshi Chhabra, Ashutosh Kumar Singh. 
300 |b Ilustr., graf. prikazi. 
504 |a Bibliografija: 36 jed. 
504 |a Summary. 
520 |a Securing the data in distributed cloud system is considered one of the major concern for the cloud customers who faces security risks. The data leakage or data tampering are widely used by attackers to extract the private information of other users who shares the confidential data through virtualization. This paper presents Secure Secret Sharing (SSS) technique which is being recognized as one of the leading method to secure the sensitive data. It shares encrypted data over cloud and generated secret key is split into different parts distributed to qualified participants (Qn) only which is analyzed by malicious checkers. It verifies the clients based on their previous performances, whether these users proved to be authorized participant or not. The key computation is evaluated by the Key handler (KH) called trusted party which manages authorized control list, encryption/decryption and reconstruction of key shares. The Lagrange’s interpolation method is used to reconstruct the secret from shares. The experimental results shows that the proposed secure data sharing algorithm not only provides excellent security and performance, but also achieves better key management and data confidentiality than previous countermeasures. It improves the security by using secure VM placement and evaluated based on time consumption and probability computation to prove the efficacy of our algorithm. Experiments are performed on cloudsim based on following parameters i.e. time computation of key generation; response time and encryption/decryption. The experimental results demonstrate that this method can effectively reduce the risks and improves the security and time consumption upto 27.81% and 43.61% over existing algorithms. 
653 0 |a Računarstvo u oblaku  |a Sigurnost  |a Povjerljivi podaci 
700 1 |a Kumar Singh, Ashutosh  |4 aut  |9 HR-ZaNSK 
773 0 |t Journal of communications software and systems (Online)  |x 1846-6079  |g 16 (2020), 4 ; str. 296-307  |w nsk.(HR-ZaNSK)000644741 
981 |b Be2020  |b B03/20 
998 |b dalo2107 
856 4 0 |u https://doi.org/10.24138/jcomss.v16i3.964 
856 4 0 |u https://jcoms.fesb.unist.hr/10.24138/jcomss.v16i3.964/  |y Journal of communications software and systems (Online) 
856 4 0 |u https://hrcak.srce.hr/246587  |y Hrčak 
856 4 1 |y Digitalna.nsk.hr