The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing
|
Author(s): Shahin Fatima (Integral University, India)and Shish Ahmad (Integral University, India)
Copyright: 2020
Volume: 16
Issue: 1
Pages: 15
Source title:
International Journal of e-Collaboration (IJeC)
Editor(s)-in-Chief: Jingyuan Zhao (University of Toronto, Canada)
DOI: 10.4018/IJeC.2020010101
Purchase
|
Abstract
Security is a crucial problem in Cloud computing. Storing and accessing the data in the Cloud is very popular nowadays but the security of data is still lagging behind. Secret sharing schemes are widely used to improve the security of data. In this article, a threshold secret sharing scheme using Newton divided difference interpolating polynomial (TSSNIP) is proposed in a distributed Cloud environment to enhance security of keys used for encryption. The proposed method uses a Newton divided difference interpolating polynomial for key splitting and key reconstruction. A threshold value is used to reconstruct the shares in secret sharing schemes. The proposed work made use of dynamic and random threshold generation method to ensure security of key. The experimental output shows reduced execution time, better security, efficiency, and robustness in the proposed scheme. Furthermore, the proposed scheme also outperformed other secret sharing schemes.
Related Content
.
© 2024.
|
Bilal Ahmad Ali Al-khateeb.
© 2024.
15 pages.
|
.
© 2024.
|
.
© 2024.
|
.
© 2024.
|
.
© 2024.
|
.
© 2024.
|
|
|