IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing

Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing
View Sample PDF
Author(s): Shahin Fatima (Integral University, India)and Shish Ahmad (Integral University, India)
Copyright: 2020
Volume: 16
Issue: 1
Pages: 15
Source title: International Journal of e-Collaboration (IJeC)
Editor(s)-in-Chief: Jingyuan Zhao (University of Toronto, Canada)
DOI: 10.4018/IJeC.2020010101

Purchase

View Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing on the publisher's website for pricing and purchasing information.

Abstract

Security is a crucial problem in Cloud computing. Storing and accessing the data in the Cloud is very popular nowadays but the security of data is still lagging behind. Secret sharing schemes are widely used to improve the security of data. In this article, a threshold secret sharing scheme using Newton divided difference interpolating polynomial (TSSNIP) is proposed in a distributed Cloud environment to enhance security of keys used for encryption. The proposed method uses a Newton divided difference interpolating polynomial for key splitting and key reconstruction. A threshold value is used to reconstruct the shares in secret sharing schemes. The proposed work made use of dynamic and random threshold generation method to ensure security of key. The experimental output shows reduced execution time, better security, efficiency, and robustness in the proposed scheme. Furthermore, the proposed scheme also outperformed other secret sharing schemes.

Related Content

. © 2024.
Bilal Ahmad Ali Al-khateeb. © 2024. 15 pages.
. © 2024.
. © 2024.
. © 2024.
. © 2024.
. © 2024.
Body Bottom