Secure Mechanisms for Key Shares in Cloud Computing

The protection of the key is important due to the vulnerabilities which exist in cloud computing. In this article, algorithms and techniques for protection of the key in cloud computing are proposed. The algorithms to select the number of virtual machines is presented to protect the key. The existin...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of rough sets and data analysis 2018-07, Vol.5 (3), p.21-41
Hauptverfasser: Buchade, Amar, Ingle, Rajesh
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The protection of the key is important due to the vulnerabilities which exist in cloud computing. In this article, algorithms and techniques for protection of the key in cloud computing are proposed. The algorithms to select the number of virtual machines is presented to protect the key. The existing key management algorithm is modified to address the key leakage issue. The novel techniques such as validation of key shares and key share resharing are introduced and analyzed for protection of the key. These techniques make the attackers incompetence to reconstruct the key. Further, for immediate access of protected resources, key reconstruction for key sizes of a cryptographic algorithm is also analyzed.
ISSN:2334-4598
2334-4601
DOI:10.4018/IJRSDA.2018070102