Abstract
We are working in the era of cloud computing, where all of the required resources are available online at pay-par-basis. It made all the IT industry easily accessible to all types of users. It provides the services in software, hardware and in storage terms. We are dealing the model of IAAS which provides on demand secured storage services. A number of researchers has designed and proposed a number of techniques and algorithms for assurance of storage services provided by cloud service providers. Our paper presents a modified approach of integrity verification in multiparty communication in decentralized cloud computing environment. We enhanced the basic model of AES with AES Poly Library 1305 and also redesigned the variant of secret sharing scheme for handling a secured group communication. Our factors for evaluation are the hardness and randomness of key i.e. entropy of the proposed technique and other measurable units which gives the efficiency of communication overhead and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amazon: Amazon elastic computes cloud. http://aws.amazon.com/ec2 (2013)
Salma, T.J.: A flexible distributed storage integrity auditing mechanism in cloud computing. In: Information Communication and Embedded System, pp. 283–287 Feb 2013
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling Public Audibility and Data Dynamics for Storage Security in Cloud Computing, pp. 847–859, May 2011
Sravan Kumar, R., Saxena, A.: Data integrity proofs in cloud storage. In: 3rd International Conference on Communication Systems and Network, 4–8 Jan 2011
Hao, Z., Zhong, S., Yu, N.: A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability, Sept 2011
Venkatesh, M., Sumalatha, M.R., Selvakumar, C.: Improving public audit ability. In: Data Possession in Data Storage for Cloud Computing, ICITISF, pp. 463–467 (2012)
Goubin, L., Martenelli, A.: Protecting AES with secret sharing scheme. In: International Association for Cryptographic Research. LNCS 6917, pp. 79–94 (2011)
Zhang, Z., Chee, Y.M., Ling, S., et al.: Threshold changeable secret sharing schemes revisited. In: Theoretical Computer Science, vol. 418, pp. 106–115 (2012)
Abbott, T., Lai, K., Lieberman, M., Price, E.: Browser-based attacks on Tor. In: Proceedings of the 7th International Conference on Privacy Enhancing Technologies (PET), pp. 184–199 (2007)
Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the 10th ACM International Conference on Information and Knowledge Management (CIKM), pp. 310–317 (2001)
Kumar, R., Verma, H.K., Dhir, R.: Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers. Wirel. Personal Commun.—Int. J. 80(3), 1281–1345 (2015). ISSN 0929-6212 (Print) 1572-834X (Online)
Kumar, R.: Cryptanalysis of protocol for enhanced threshold proxy signature scheme based on elliptic curve cryptography for known signers. Knowl. Comput. Appl. (2018). https://doi.org/10.1007/978. ISBN 978-981-10-6679-5. Springer Nature Singapore Pte Ltd.
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing. Technical Report UCB/EECS-2009–28, U.C. Berkeley (2009)
Acharya, A., Raje, M.: MAPbox: using parameterized behavior classes to confine untrusted applications. In: Proceedings of the 9th USENIX Security Symposium (2000)
Aktug, I., Dam, M., Gurov, D.: Provably correct runtime monitoring. In: Proceedings of the 15th International Symposium on Formal Methods (FM), pp. 262–277 (2008)
Jianhang, Z., Hua, C.: Security Storage in the Cloud Computing: A RSA-Based Assumption Data Integrity Check without Original Data, pp. 143–147 (2010)
Patel, A.A., Jaya Nirmala, S., Mary Sarina, S.: Security and availability of data in the cloud. In: Advances in Computing and Inform Technology, AISC 176, pp. 255–261 (2012)
Abawajy, J.: Determining service trustworthiness in intercloud computing, environments. In: Proceedings of the International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN), pp. 784–788 (2009)
Anderson, D.P., Cobb, J., Korpela, E., Lebofsky, M., Werthimer, D.: SETI@home: an experiment in public-resource computing. Commun. ACM (CACM) 45(11), 56–61 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Arora, S., Dalal, S., Kumar, R. (2019). A Variant of Secret Sharing Protected with Poly-1305. In: Kumar, R., Wiil, U. (eds) Recent Advances in Computational Intelligence. Studies in Computational Intelligence, vol 823. Springer, Cham. https://doi.org/10.1007/978-3-030-12500-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-12500-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12499-1
Online ISBN: 978-3-030-12500-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)