Abstract

Distributed Cloud Environment (DCE) focuses mainly on securing the data and safely shares it to the user. Data leakage may occur by the channel compromising or with the key managers. It is necessary to safeguard the communication channel between the entities before sharing the data. In this process of sharing, what if the key managers compromises with intruders and reveal the information of the user’s key that is used for encryption. The process of securing the key by using the user’s phrase is the key concept used in the proposed system “Secure Storing and Sharing of Data in Cloud Environment using User Phrase (S3DCE). It does not rely on any key managers to generate the key instead; the user himself generates the key. In order to provide double security, the public key derived from the user’s phrase also encrypts the encryption key. S3DCE guarantees privacy, confidentiality and integrity of the user data while storing and sharing. The proposed method S3DCE is more efficient in terms of time, cost and resource utilization compared to the existing algorithm DaSCE (Data Security for Cloud Environment with Semi Trusted Third Party) [22] and DACESM (Data Security for Cloud Environment with Scheduled Key Managers) [23].

Highlights

  • Cloud computing means offering the system resources especially for data sharing and for computing to the users without any direct active management by them

  • By eliminating the key manager and shamir’s concept, the proposed method S3DCE takes much less time compared to the existing system DaSCE and DSCESM

  • The uploading time reduces by 88% in S3DCE compared to DaSCE and 61% in S3DCE compared to DSCESM

Read more

Summary

INTRODUCTION

Cloud computing means offering the system resources especially for data sharing and for computing to the users without any direct active management by them. Data centres [2] plays an important role in storing the user’s data and access them through the internet. This greatly reduces the users cost on spending on the other storage devices like flash-drives, pen-drives and hard disks. The cloud service providers works on pay-as-you-use model where the providers offers the storage space so that the users can scale up/down the storage space based on their requirement These data centres does not belong to the users, instead they are owned by the cloud service provider. If one data centre goes down, the user can get their data from other data centre from where the copy is stored This is an important benefit offered by the cloud known as “Disaster Recovery”. The proposed method S3DCE provides the privacy, confidentiality and integrity to the user’s data by encrypting the key that is used to secure the data

Motivation
Contributions
Organizations
LITERATURE SURVEY
BACKGROUND
Single Interaction
One-to-One Interaction
One-to-Many Interaction
OTK Algorithm
Key Derivation Function
Findings
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call