Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 20
Page No. 3973 - 3979

Cryptographic Tree and Log File Based Secret Sharing Key Management Scheme for Securing Outsourced Data in Cloud

Authors : S. Ahamed Ali and M. Ramakrishnan

Abstract: Cloud computing from the last few years has grown from a promising business concept to one of the fastest growing segments of IT Enterprise. This unique paradigm brings about many new security challenges. This research studies the problem of ensuring the storage security to the data outsourced in the cloud which is accessed and controlled by multiple legitimate parties. For this we propose a very practical approach of providing security to the data outsourced in the cloud environment based on both Cry ptographic Tree and Log File (CTLF).The Cryptographic tree and log file is used to authenticate a set a data items and preserve block level integrity to the outsourced data. This approach generates a master key for encryption and decryption using the primary key k which is provided by the cloud client and the secondary key k , the primary key k is p s p secret shared among “n” share holders nodes. This scheme is more reliable, decentralized light weight key management scheme which provides better security and performance than existing ones. This scheme also allows multiple legitimate parties to access the data outsourced in the cloud without making compromise on security.

How to cite this article:

S. Ahamed Ali and M. Ramakrishnan, 2016. Cryptographic Tree and Log File Based Secret Sharing Key Management Scheme for Securing Outsourced Data in Cloud. Asian Journal of Information Technology, 15: 3973-3979.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved