SECURE AND RECOVERABLE SPLIT KEY MANAGEMENT TECHNIQUE FOR CLOUD STORAGE

Authors

  • Theophilus Rakesh S VIT University, Chennai Campus, Chennai, Tamil Nadu, India
  • Pradeep Kv VIT University, Chennai Campus, Chennai, Tamil Nadu, India

DOI:

https://doi.org/10.22159/ajpcr.2017.v10s1.19586

Keywords:

Cloud service provider, Certificate authority, Key management problem, Plain text, Ciphertext

Abstract

Establishing mutual trust between a cloud service provider (CSP) and a client has always been a challenge. Managing the key as a whole on either of these sites poses a security risk and also questions the integrity and availability of the data itself. In this paper, we propose an effective solution to manage key at the client's location, while the CSP still manages a portion of the key. The proposed technique secures the key itself and also provides a fail-safe mechanism to retrieve the key if lost.

Downloads

Download data is not yet available.

References

Shnaikat KN, Al-Qudah AA. Assortment of key management techniques for wireless sensor networks. Int J Adv Technol Eng Res 2014;6(6):49-63.

Bala S, Sharma G, Verma AK. Classification of symmetric key management schemes for wireless sensor networks. Int J Secur Appl 2013;7(2):117-38.

European Payments Council. Guidelines on Algorithms Usage and Key Management, Version 4.0. ???: EPC (European Payments Council); 2014.

Jayaraj V, Indhumathi M, Mathimalar V, Hemalatha S, Durai U. Secure data aggregation using efficient key management technique in wireless sensor network. Int J Comput Appl 2014;89(9):6-11.

Metan J, Murthy KN. Group key management technique based on logic-key tree in the field of wireless sensor network. Int J Comput Appl 2015;117(12):9-15.

Huang D, Mehta M, Medhi D, Harn L. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. Hong Kong: IEEE INFOCOM; 2004.

Bala S, Sharma G, Verma AK. Classification of symmetric key management schemes for wireless sensor networks. Int J Secur Appl 2013;7(2):117-38.

Key Management for Cloud Data Storage: Methods and Comparisons. 2014 Fourth International Conference on Advanced Computing & Communication Technologies; 2014.

Trappe W, Song J, Poovendran R, Liu KJ. Key management and distribution for secure multimedia multicast. IEEE Trans Multimed 2003;5(4):54457.

Thakur J, Kumar N. DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis. Int J Emerging Technol Adv Eng 2011;1(2):6-12.

Renjith PR, Sojan A, Gopinadhan PK. A novel method for symmetric encryption using split plaintext key pair (Pi,Ki) algorithm. Netw Secur Cryptogr NSC 2011;2:36-41.

Buyya R. Introduction to the IEEE transactions on cloud computing. IEEE Trans Cloud Comput 2013;1(1):1-9.

Liu H. Study of authentication with IoT testbed. Dartmouth MA, USA: Department of Electrical and Computer Engineering, University of Massachusetts. IEEE 14-16 April; 2015.

???. Cloud computing security challenges and threats: A systematic map. Int J Adv Eng Technol 2015;???:???.

Bogdanov A, Dobraunig C, Eichlseder M, Lauridsen MM, Mendel F, Schläffer M, et al. Key Recovery Attacks on Recent Authenticated Ciphers. Switzerland: Springer International Publishing; 2015.

Published

01-04-2017

How to Cite

S, T. R., and P. Kv. “SECURE AND RECOVERABLE SPLIT KEY MANAGEMENT TECHNIQUE FOR CLOUD STORAGE”. Asian Journal of Pharmaceutical and Clinical Research, vol. 10, no. 13, Apr. 2017, pp. 109-11, doi:10.22159/ajpcr.2017.v10s1.19586.

Issue

Section

Original Article(s)