SECURE AND RECOVERABLE SPLIT KEY MANAGEMENT TECHNIQUE FOR CLOUD STORAGE
DOI:
https://doi.org/10.22159/ajpcr.2017.v10s1.19586Keywords:
Cloud service provider, Certificate authority, Key management problem, Plain text, CiphertextAbstract
Establishing mutual trust between a cloud service provider (CSP) and a client has always been a challenge. Managing the key as a whole on either of these sites poses a security risk and also questions the integrity and availability of the data itself. In this paper, we propose an effective solution to manage key at the client's location, while the CSP still manages a portion of the key. The proposed technique secures the key itself and also provides a fail-safe mechanism to retrieve the key if lost.
Downloads
References
Shnaikat KN, Al-Qudah AA. Assortment of key management techniques for wireless sensor networks. Int J Adv Technol Eng Res 2014;6(6):49-63.
Bala S, Sharma G, Verma AK. Classification of symmetric key management schemes for wireless sensor networks. Int J Secur Appl 2013;7(2):117-38.
European Payments Council. Guidelines on Algorithms Usage and Key Management, Version 4.0. ???: EPC (European Payments Council); 2014.
Jayaraj V, Indhumathi M, Mathimalar V, Hemalatha S, Durai U. Secure data aggregation using efficient key management technique in wireless sensor network. Int J Comput Appl 2014;89(9):6-11.
Metan J, Murthy KN. Group key management technique based on logic-key tree in the field of wireless sensor network. Int J Comput Appl 2015;117(12):9-15.
Huang D, Mehta M, Medhi D, Harn L. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. Hong Kong: IEEE INFOCOM; 2004.
Bala S, Sharma G, Verma AK. Classification of symmetric key management schemes for wireless sensor networks. Int J Secur Appl 2013;7(2):117-38.
Key Management for Cloud Data Storage: Methods and Comparisons. 2014 Fourth International Conference on Advanced Computing & Communication Technologies; 2014.
Trappe W, Song J, Poovendran R, Liu KJ. Key management and distribution for secure multimedia multicast. IEEE Trans Multimed 2003;5(4):54457.
Thakur J, Kumar N. DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis. Int J Emerging Technol Adv Eng 2011;1(2):6-12.
Renjith PR, Sojan A, Gopinadhan PK. A novel method for symmetric encryption using split plaintext key pair (Pi,Ki) algorithm. Netw Secur Cryptogr NSC 2011;2:36-41.
Buyya R. Introduction to the IEEE transactions on cloud computing. IEEE Trans Cloud Comput 2013;1(1):1-9.
Liu H. Study of authentication with IoT testbed. Dartmouth MA, USA: Department of Electrical and Computer Engineering, University of Massachusetts. IEEE 14-16 April; 2015.
???. Cloud computing security challenges and threats: A systematic map. Int J Adv Eng Technol 2015;???:???.
Bogdanov A, Dobraunig C, Eichlseder M, Lauridsen MM, Mendel F, Schläffer M, et al. Key Recovery Attacks on Recent Authenticated Ciphers. Switzerland: Springer International Publishing; 2015.
Published
How to Cite
Issue
Section
The publication is licensed under CC By and is open access. Copyright is with author and allowed to retain publishing rights without restrictions.