Skip to main content

A Variant of Secret Sharing Protected with Poly-1305

  • Chapter
  • First Online:
Recent Advances in Computational Intelligence

Part of the book series: Studies in Computational Intelligence ((SCI,volume 823))

Abstract

We are working in the era of cloud computing, where all of the required resources are available online at pay-par-basis. It made all the IT industry easily accessible to all types of users. It provides the services in software, hardware and in storage terms. We are dealing the model of IAAS which provides on demand secured storage services. A number of researchers has designed and proposed a number of techniques and algorithms for assurance of storage services provided by cloud service providers. Our paper presents a modified approach of integrity verification in multiparty communication in decentralized cloud computing environment. We enhanced the basic model of AES with AES Poly Library 1305 and also redesigned the variant of secret sharing scheme for handling a secured group communication. Our factors for evaluation are the hardness and randomness of key i.e. entropy of the proposed technique and other measurable units which gives the efficiency of communication overhead and security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amazon: Amazon elastic computes cloud. http://aws.amazon.com/ec2 (2013)

  2. Salma, T.J.: A flexible distributed storage integrity auditing mechanism in cloud computing. In: Information Communication and Embedded System, pp. 283–287 Feb 2013

    Google Scholar 

  3. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling Public Audibility and Data Dynamics for Storage Security in Cloud Computing, pp. 847–859, May 2011

    Article  Google Scholar 

  4. Sravan Kumar, R., Saxena, A.: Data integrity proofs in cloud storage. In: 3rd International Conference on Communication Systems and Network, 4–8 Jan 2011

    Google Scholar 

  5. Hao, Z., Zhong, S., Yu, N.: A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability, Sept 2011

    Google Scholar 

  6. Venkatesh, M., Sumalatha, M.R., Selvakumar, C.: Improving public audit ability. In: Data Possession in Data Storage for Cloud Computing, ICITISF, pp. 463–467 (2012)

    Google Scholar 

  7. Goubin, L., Martenelli, A.: Protecting AES with secret sharing scheme. In: International Association for Cryptographic Research. LNCS 6917, pp. 79–94 (2011)

    Google Scholar 

  8. Zhang, Z., Chee, Y.M., Ling, S., et al.: Threshold changeable secret sharing schemes revisited. In: Theoretical Computer Science, vol. 418, pp. 106–115 (2012)

    Article  MathSciNet  Google Scholar 

  9. Abbott, T., Lai, K., Lieberman, M., Price, E.: Browser-based attacks on Tor. In: Proceedings of the 7th International Conference on Privacy Enhancing Technologies (PET), pp. 184–199 (2007)

    Google Scholar 

  10. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the 10th ACM International Conference on Information and Knowledge Management (CIKM), pp. 310–317 (2001)

    Google Scholar 

  11. Kumar, R., Verma, H.K., Dhir, R.: Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers. Wirel. Personal Commun.—Int. J. 80(3), 1281–1345 (2015). ISSN 0929-6212 (Print) 1572-834X (Online)

    Article  Google Scholar 

  12. Kumar, R.: Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers. Knowl. Comput. Appl. (2018). https://doi.org/10.1007/978. ISBN 978-981-10-6679-5. Springer Nature Singapore Pte Ltd.

  13. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing. Technical Report UCB/EECS-2009–28, U.C. Berkeley (2009)

    Google Scholar 

  14. Acharya, A., Raje, M.: MAPbox: using parameterized behavior classes to confine untrusted applications. In: Proceedings of the 9th USENIX Security Symposium (2000)

    Google Scholar 

  15. Aktug, I., Dam, M., Gurov, D.: Provably correct runtime monitoring. In: Proceedings of the 15th International Symposium on Formal Methods (FM), pp. 262–277 (2008)

    Google Scholar 

  16. Jianhang, Z., Hua, C.: Security Storage in the Cloud Computing: A RSA-Based Assumption Data Integrity Check without Original Data, pp. 143–147 (2010)

    Google Scholar 

  17. Patel, A.A., Jaya Nirmala, S., Mary Sarina, S.: Security and availability of data in the cloud. In: Advances in Computing and Inform Technology, AISC 176, pp. 255–261 (2012)

    Chapter  Google Scholar 

  18. Abawajy, J.: Determining service trustworthiness in intercloud computing, environments. In: Proceedings of the International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN), pp. 784–788 (2009)

    Google Scholar 

  19. Anderson, D.P., Cobb, J., Korpela, E., Lebofsky, M., Werthimer, D.: SETI@home: an experiment in public-resource computing. Commun. ACM (CACM) 45(11), 56–61 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shakti Arora .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Arora, S., Dalal, S., Kumar, R. (2019). A Variant of Secret Sharing Protected with Poly-1305. In: Kumar, R., Wiil, U. (eds) Recent Advances in Computational Intelligence. Studies in Computational Intelligence, vol 823. Springer, Cham. https://doi.org/10.1007/978-3-030-12500-4_7

Download citation

Publish with us

Policies and ethics