Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 12 SI
Page No. 9490 - 9495

Data Security Using Odd-Even Threshold Cryptography in Cloud Computing

Authors : D. Kosare and D. Naidu

Abstract: The malicious insider may be an employees, user or cloud service provider. In cloud environment, data owner may store diplomatic data of their organization in cloud storage. The cloud service provider should guarantee integrity, security, access control and confidentiality about the stored data at cloud. The malicious insiders can conduct burglary on sensitive data at cloud storage. Most of the organizations pay no attention the insider attack because it is harder to detect and mitigate. This is a major emerging problem in organizations. In order to tackle these issues we proposed odd-even threshold cryptography scheme at users side in which data owner divides users in groups and further groups are divide into two user groups (i.e., odd and even user groups) and gives single key to each user groups for decryption of data. Distributed parallel processing is applied on two groups (i.e., odd and even user groups) for simultaneously performing two decryption processes. The main features of this scheme is that data are prohibiting from malicious insider attack, also, reduce the number of security key and decryption process time.

How to cite this article:

D. Kosare and D. Naidu, 2017. Data Security Using Odd-Even Threshold Cryptography in Cloud Computing. Journal of Engineering and Applied Sciences, 12: 9490-9495.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved