SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1930
Schemes for Securing Cloud Data when the Cryptographic Material is
Exposed: A Review
Anagha Darokar1, Dr. P. N. Chatur 2
1 M. Tech. Scholar, Department of Computer Science and Engineering, Government College of Engineering,
Amravati (MH) India
2Head, Department of Computer Science and Engineering, Government College of Engineering,
Amravati (MH) India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud storage is becoming one of the most
attractive choices for individuals and enterprises to store
their large scale data. It can avoid committing large capital
of user for purchasing and managing hardware and
software. Even if the benefits of cloud storage are
tremendous, security concern become significant challenge
for cloud storage. Key exposure is one of the serious security
issues in cloud storage system. Once the key is exposed data
confidentiality is lost. This review shows the different
schemes that are useful to overcome the key exposure issue.
Key Words: Cloud Computing, Cryptography, Key
Exposure, Erasure codes.
1.INTRODUCTION
Cloud computing is a promising computing paradigm
which recently has drawn extensive attention from both
academia and industry. By combining a set of existing and
new techniques from research areas such as Service-
Oriented Architectures and virtualization, cloud
computing is regarded as such a computing paradigm in
which resources in the computing infrastructure are
provided as services over the Internet. Along with this
new paradigm, various business models are developed,
which can be described by terminology of “X as a service”
where X could be software, hardware, data storage, and
etc. Successful examples are Amazon’s EC2 and S3, Google
App Engine, and Microsoft Azure which provide users with
scalable resources in the pay-as-you use fashion at
relatively low prices. For example, Amazon’s S3 data
storage service just charges $0.12 to $0.15 per gigabyte
month. Instead of building their own infrastructures, users
are able to save their investments significantly by
migrating businesses into the cloud. With the increasing
development of cloud computing technologies, it is not
hard to imagine that in the near future more and more
businesses will be moved into the cloud.
As promising as it is, cloud computing is also facing many
challenges that, if not well resolved, may impede its fast
growth. Data security, as it exists in many other
applications, is among these challenges that would raise
great concerns from users when they store sensitive
information on cloud servers. These concerns originate
from the fact that cloud servers are usually operated by
commercial providers which are very likely to be outside
of the trusted domain of the users. Data confidential
against cloud servers is hence frequently desired when
users outsource data for storage in the cloud. In some
practical application systems, data confidentiality is not
only a security/privacy issue, but also of juristic concerns.
For example, in healthcare application scenarios use and
disclosure of protected health information should meet
the requirements of Health Insurance Portability and
Accountability Act, and keeping user data confidential
against the storage servers is not just an option, but a
requirement. [9]
Outsourcing data to the cloud are beneficial for reasons of
economy, scalability, and accessibility, but significant
technical challenges remain. Sensitive data stored in the
cloud must be protected from being read in the clear by a
cloud provider that is honest but-curious. Day by day as
the technology increases the attackers also become
powerful such attackers break the data confidentiality by
acquiring cryptographic key by unauthorized way. Once
the key exposed data confidentiality is lost.
Key exposure is one serious security problem for cloud
storage system. This review includes those security
schemes which resolve the key exposure issue in some
extends. Different types of encryption modes and
techniques are available some of the are as follows
A. CPA-Encryption modes
These encryption modes provide the ind security but are
only 1 CAKE (Ciphertext Access under Key Exposure)
secure. That is, an adversary equipped with the encryption
key must only fetch two ciphertext blocks to break data
confidentiality.
B. CPA-Encryption and Secret-sharing
This encryption mode combine the CPA secure encryption
modes and secret-sharing. If the file f is encrypted and
then shared with an n-out-of-n secret-sharing scheme
(denoted as “encrypt then-secret-share” in the following),
then the construction is clearly (n − 1)CAKE secure and is
also ind secure. However, secret-sharing the ciphertext
comes at considerable storage costs; for example, each
share would be as large as the file f using a perfect secret
sharing scheme—which makes it impractical for storing
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1931
large files. Secret-sharing the encryption key and
dispersing its shares across the storage servers alongside
the ciphertext is not secure against an ind-adversary.
Indeed, if the adversary can access all the storage servers
and download all ciphertext blocks, the adversary may as
well download all key shares and compute the encryption
key.
provide the protection against chosen plaintext attack and
related message attack.
Anand Desai [4] present a scheme which combine All-or-
nothing transform with an ordinary encryption mode. The
main motivation is to have secure encryption mode that
protecting against the exhaustive key search attack. The
all-or-nothing encryption paradigm was suggested as
means to achieve strongly non-separable encryption
modes. It involves using an all-or-nothing transform as a
pre-processing step to an ordinary encryption mode.
Jason K. Resch, James S. Plank [5] describe a new scheme
which combine the All-or-nothing Transform with Reed-
Solomon coding to achieve high security with low
computational and storage cost.
Amos Beimel [6] present a survey on secret sharing
scheme. A secret-sharing scheme is a method by which a
dealer distributes shares to parties such that only
authorized subsets of parties can reconstruct the secret.
Secret-sharing schemes are important tools in
cryptography and also used as a building box in protocols
like general protocol for multiparty computation,
Byzantine agreement, threshold cryptography, access
control, attribute-based encryption, and generalized
oblivious transfer. Secret-sharing schemes are a tool used
in many cryptographic protocols.
S. Micali and L. Reyzin [7] present leakage-resilient
cryptography. Leakage-resilient cryptography aims at
designing cryptographic primitives that can resist an
adversary which learns partial information about the
secret state of a system, e.g., through side-channels. Various
models allow to reason about the “leaks” of real
implementations of cryptographic primitives. All of these
models, however, limit in some way the knowledge of the
secret state of a system by the adversary.
Jia Yu and Huaqun Wang [8] present a cloud storage auding
scheme with key exposure resilience. In proposed scheme
the key exposure in one time period doesn’t affect the
security of cloud storage auditing in other time periods.
Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou [9]
proposed a scheme which uniquely combining techniques
of attribute-based encryption,proxy re-encryption, and lazy
re-encryption for achieving secure,scalable, and fine-
grained data access control in cloud computing. The
proposed scheme can enable the data owner to delegate
most of computational overhead to powerful cloud servers.
Confidentiality of user access privilege and user secret key
accountability can be achieved.
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota,
Srdjan Capkun [10] present a Bastion encryption scheme.
This scheme gurantees data confidentiality even if the
encryption key is leaked and the adversary has access to
almost all ciphertext blocks. Bastion requires only one
round of Encryption which make it well-suited to be
C. All-or-nothing Encryption
All-or-nothing is not an encryption scheme and does not
require the decryptor to have any secret key. That is, an
All-or-nothing Transform is not secure against an ind-
adversary which can access all the ciphertext blocks. One
alternative is to combine the use of All-or-nothing
Transform with standard encryption. Rivest suggests to
pre-process a message with an All-or-nothing Transform
and then encrypt its output with an encryption mode. This
paradigm is referred to in the literature as All-or-nothing
encryption and provides (n−1) CAKE security. Existing All-
or-nothing encryption schemes require at least two
rounds of block cipher encryption with two different keys.
At least one round is required for the actual All-or-nothing
Transform that embeds the first encryption key in the
pseudo-ciphertext. An additional round uses another
encryption key that is kept secret to guarantee CPA-
security. However, two encryption rounds constitute a
considerable overhead when encrypting and decrypting
large files. These solutions are either not satisfactory in
terms of security or incur a large overhead when
compared to Bastion and may not be suitable to store
large files in a multi-cloud storage system.[10].
2. RELATED WORK
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky
[1] present the deniable encryption scheme. An encryption
scheme is deniable if the sender can generate ‘fake random
choices’ that will make the ciphertext ‘look like’an
encryption of different cleartext, thus keeping the real
cleartext private.
Marcos K. Aguilera, Ramaprabhu Janakiraman, Lihao Xu [2]
proposed a protocol in which they describe the concept of
Erasure Codes Efficiently for Storage of data in a
distributed system. . Erasure codes enable users to
distribute their data on a number of servers and recover it
despite some servers failures. Erasure codes provide
space-optimal data redundancy to protect against data loss.
Erasure codes are powerful alternatives to replication for
storage, as they provide better space efficiency and finer
control over the redundancy level. The proposed protocol
allow the use of highly-efficient erasure codes, i. e., codes
with large n and k and small n-k.
Ronal L. Rivest [3] present new mode of encryption for
block cipher called all-or-nothing encryption. This mode
has the interesting property that one must decrypt the
entire ciphertext into plaintext before one can determine
even single message block. All-or-nothing encryption
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1932
integrated in existing dispersed storage system. Bastion
only incurs a negligible performance deterioration (less
than 5%) when compared to symmetric encryption
schemes, and considerably improves the performance of
existing All-or-nothing encryption schemes.
3. CONCLUSIONS
This paper addressed different cryptographic schemes that
resolve the problem of key exposure. After reviewing all
the above defined cryptographic schemes it can be
concluded that Bastion is more efficient scheme than the
All-or-nothing encryption scheme. Bastion require only one
round of encryption and it incur a negligible percentage of
overhead compared to other encryption scheme. In cloud
storage auditing scheme the key exposure in one time
period doesn’t affect the security of cloud storage auditing
in other time periods. In future we will propose a scheme
which the combination of all-or-nothing and Bastion
scheme that strongly overcome the key exposure problem
and also reduces the overhead.
REFERENCES
[1] R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky,
“Deniable Encryption,” in Proceedings of CRYPTO,
1997.
[2] M. K. Aguilera, R. Janakiraman, and L. Xu, “Using
Erasure Codes Efficiently for Storage in a Distributed
System,” in International Conference on Dependable
Systems and Networks (DSN), 2005, pp. 336–345.
[3] R. L. Rivest, “All-or-Nothing Encryption and the
Package Transform,” in International Workshop on
Fast Software Encryption (FSE), 1997, pp. 210–218.
[4] A. Desai, “The security of all-or-nothing encryption:
Protecting against exhaustive key search,” in Advances
in Cryptology (CRYPTO), 2000, pp. 359–375.
[5] J. K. Resch and J. S. Plank, “AONT-RS: Blending Security
and Performance in Dispersed Storage Systems,” in
USENIX Conference on File and Storage Technologies
(FAST), 2011, pp. 191–202.
[6] A. Beimel, “Secret-sharing schemes: A survey,” in
International Workshop on Coding and Cryptology
(IWCC), 2011, pp. 11–46.
[7] S. Micali and L. Reyzin, “Physically observable
cryptography (extended abstract),” in Theory of
Cryptography Conference (TCC), 2004, pp. 278–296.
[8] Jia Yu and Huaqan Wang. “Strong Key-Exposure
Resilient Auditing for Secure Cloud Storage,” in IEEE
Transaction on Information Forensics and Security,
Vol., No., 2016.
[9] Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou,
“Achieving Secure, Scalable, and Fine-grained Data
Access Control in Cloud Computing,” Proc.IEEE
INFOCOM’10, pp. 534-542, 2010
[10] Ghassan O. Karame, Claudio Soriente, Krzysztof
Lichota, Srdjan Capkun, “Securing Cloud Data under
Key Exposure,” IEEE Transaction on Cloud Computing
2017.
[11] Anup Mathew, “Survey Paper on Security & Privacy
Issues in Cloud Storage Systems,” EECE 571B, Term
Survey Paper,April 2012.
[12] Y. Chen and R. Sion, “On Securing untrusted clouds
with cryptography,” In Processings of 9th annual ACM
workshop on Privacy in the electronicsociety, pp.109-
114, ACM WPES’10,2010
[13] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, Dept. of
ECE, ILLinois Inst. Of Technology, “Ensuring data
storage security in cloud computing,” 17th
International Workshop on Quality of Service,2009
[14] K. Yang and X. Jia, “Attributed-Based Access Control
for MultiAuthority Systems in Cloud Storage,” Proc.
IEEE 32nd Int’l Conf. Distributed Computing Systems
(ICDCS), pp. 536-545, 2012.
[15] G. Zhao, C. Rong, J. Li, F. Zhang, and Y. Tang, “Trusted
Data Sharing over Untrusted Cloud Storage
Providers,” Proc. IEEE Second Int’l Conf. Cloud
Computing Technology and Science (CLOUDCOM ’10),
pp. 97-103, 2010
[16] P.K. Tysowski and M.A. Hasan, “Towards Secure
Communication for Highly Scalable Mobile
Applications in Cloud Computing Systems,” Technical
Report 33, Centre for Applied Cryptographic Research
(CACR), Univ. of Waterloo, 2011.
[17] Q. Liu, G. Wang, and J. Wu, “Clock-Based Proxy Re-
Encryption Scheme in Unreliable Clouds,” Proc. 41st
Int’l Conf. Parallel Processing Workshops (ICPPW), pp.
304-305, Sept. 2012.
[18] P.K. Tysowski and M.A. Hasan, “Hybrid Attribute-
Based Encryption and Re-Encryption for Scalable
Mobile Applications in Clouds,” Technical Report 13,
Centre for Applied Cryptographic Research (CACR),
Univ. of Waterloo, 2013.

More Related Content

What's hot

IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryptionijcisjournal
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 

What's hot (20)

IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
 
262 265
262 265262 265
262 265
 
C017421624
C017421624C017421624
C017421624
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 

Similar to IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exposed: A Review

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 

Similar to IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exposed: A Review (20)

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
Paper1
Paper1Paper1
Paper1
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exposed: A Review

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1930 Schemes for Securing Cloud Data when the Cryptographic Material is Exposed: A Review Anagha Darokar1, Dr. P. N. Chatur 2 1 M. Tech. Scholar, Department of Computer Science and Engineering, Government College of Engineering, Amravati (MH) India 2Head, Department of Computer Science and Engineering, Government College of Engineering, Amravati (MH) India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud storage is becoming one of the most attractive choices for individuals and enterprises to store their large scale data. It can avoid committing large capital of user for purchasing and managing hardware and software. Even if the benefits of cloud storage are tremendous, security concern become significant challenge for cloud storage. Key exposure is one of the serious security issues in cloud storage system. Once the key is exposed data confidentiality is lost. This review shows the different schemes that are useful to overcome the key exposure issue. Key Words: Cloud Computing, Cryptography, Key Exposure, Erasure codes. 1.INTRODUCTION Cloud computing is a promising computing paradigm which recently has drawn extensive attention from both academia and industry. By combining a set of existing and new techniques from research areas such as Service- Oriented Architectures and virtualization, cloud computing is regarded as such a computing paradigm in which resources in the computing infrastructure are provided as services over the Internet. Along with this new paradigm, various business models are developed, which can be described by terminology of “X as a service” where X could be software, hardware, data storage, and etc. Successful examples are Amazon’s EC2 and S3, Google App Engine, and Microsoft Azure which provide users with scalable resources in the pay-as-you use fashion at relatively low prices. For example, Amazon’s S3 data storage service just charges $0.12 to $0.15 per gigabyte month. Instead of building their own infrastructures, users are able to save their investments significantly by migrating businesses into the cloud. With the increasing development of cloud computing technologies, it is not hard to imagine that in the near future more and more businesses will be moved into the cloud. As promising as it is, cloud computing is also facing many challenges that, if not well resolved, may impede its fast growth. Data security, as it exists in many other applications, is among these challenges that would raise great concerns from users when they store sensitive information on cloud servers. These concerns originate from the fact that cloud servers are usually operated by commercial providers which are very likely to be outside of the trusted domain of the users. Data confidential against cloud servers is hence frequently desired when users outsource data for storage in the cloud. In some practical application systems, data confidentiality is not only a security/privacy issue, but also of juristic concerns. For example, in healthcare application scenarios use and disclosure of protected health information should meet the requirements of Health Insurance Portability and Accountability Act, and keeping user data confidential against the storage servers is not just an option, but a requirement. [9] Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest but-curious. Day by day as the technology increases the attackers also become powerful such attackers break the data confidentiality by acquiring cryptographic key by unauthorized way. Once the key exposed data confidentiality is lost. Key exposure is one serious security problem for cloud storage system. This review includes those security schemes which resolve the key exposure issue in some extends. Different types of encryption modes and techniques are available some of the are as follows A. CPA-Encryption modes These encryption modes provide the ind security but are only 1 CAKE (Ciphertext Access under Key Exposure) secure. That is, an adversary equipped with the encryption key must only fetch two ciphertext blocks to break data confidentiality. B. CPA-Encryption and Secret-sharing This encryption mode combine the CPA secure encryption modes and secret-sharing. If the file f is encrypted and then shared with an n-out-of-n secret-sharing scheme (denoted as “encrypt then-secret-share” in the following), then the construction is clearly (n − 1)CAKE secure and is also ind secure. However, secret-sharing the ciphertext comes at considerable storage costs; for example, each share would be as large as the file f using a perfect secret sharing scheme—which makes it impractical for storing
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1931 large files. Secret-sharing the encryption key and dispersing its shares across the storage servers alongside the ciphertext is not secure against an ind-adversary. Indeed, if the adversary can access all the storage servers and download all ciphertext blocks, the adversary may as well download all key shares and compute the encryption key. provide the protection against chosen plaintext attack and related message attack. Anand Desai [4] present a scheme which combine All-or- nothing transform with an ordinary encryption mode. The main motivation is to have secure encryption mode that protecting against the exhaustive key search attack. The all-or-nothing encryption paradigm was suggested as means to achieve strongly non-separable encryption modes. It involves using an all-or-nothing transform as a pre-processing step to an ordinary encryption mode. Jason K. Resch, James S. Plank [5] describe a new scheme which combine the All-or-nothing Transform with Reed- Solomon coding to achieve high security with low computational and storage cost. Amos Beimel [6] present a survey on secret sharing scheme. A secret-sharing scheme is a method by which a dealer distributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes are important tools in cryptography and also used as a building box in protocols like general protocol for multiparty computation, Byzantine agreement, threshold cryptography, access control, attribute-based encryption, and generalized oblivious transfer. Secret-sharing schemes are a tool used in many cryptographic protocols. S. Micali and L. Reyzin [7] present leakage-resilient cryptography. Leakage-resilient cryptography aims at designing cryptographic primitives that can resist an adversary which learns partial information about the secret state of a system, e.g., through side-channels. Various models allow to reason about the “leaks” of real implementations of cryptographic primitives. All of these models, however, limit in some way the knowledge of the secret state of a system by the adversary. Jia Yu and Huaqun Wang [8] present a cloud storage auding scheme with key exposure resilience. In proposed scheme the key exposure in one time period doesn’t affect the security of cloud storage auditing in other time periods. Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou [9] proposed a scheme which uniquely combining techniques of attribute-based encryption,proxy re-encryption, and lazy re-encryption for achieving secure,scalable, and fine- grained data access control in cloud computing. The proposed scheme can enable the data owner to delegate most of computational overhead to powerful cloud servers. Confidentiality of user access privilege and user secret key accountability can be achieved. Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun [10] present a Bastion encryption scheme. This scheme gurantees data confidentiality even if the encryption key is leaked and the adversary has access to almost all ciphertext blocks. Bastion requires only one round of Encryption which make it well-suited to be C. All-or-nothing Encryption All-or-nothing is not an encryption scheme and does not require the decryptor to have any secret key. That is, an All-or-nothing Transform is not secure against an ind- adversary which can access all the ciphertext blocks. One alternative is to combine the use of All-or-nothing Transform with standard encryption. Rivest suggests to pre-process a message with an All-or-nothing Transform and then encrypt its output with an encryption mode. This paradigm is referred to in the literature as All-or-nothing encryption and provides (n−1) CAKE security. Existing All- or-nothing encryption schemes require at least two rounds of block cipher encryption with two different keys. At least one round is required for the actual All-or-nothing Transform that embeds the first encryption key in the pseudo-ciphertext. An additional round uses another encryption key that is kept secret to guarantee CPA- security. However, two encryption rounds constitute a considerable overhead when encrypting and decrypting large files. These solutions are either not satisfactory in terms of security or incur a large overhead when compared to Bastion and may not be suitable to store large files in a multi-cloud storage system.[10]. 2. RELATED WORK Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky [1] present the deniable encryption scheme. An encryption scheme is deniable if the sender can generate ‘fake random choices’ that will make the ciphertext ‘look like’an encryption of different cleartext, thus keeping the real cleartext private. Marcos K. Aguilera, Ramaprabhu Janakiraman, Lihao Xu [2] proposed a protocol in which they describe the concept of Erasure Codes Efficiently for Storage of data in a distributed system. . Erasure codes enable users to distribute their data on a number of servers and recover it despite some servers failures. Erasure codes provide space-optimal data redundancy to protect against data loss. Erasure codes are powerful alternatives to replication for storage, as they provide better space efficiency and finer control over the redundancy level. The proposed protocol allow the use of highly-efficient erasure codes, i. e., codes with large n and k and small n-k. Ronal L. Rivest [3] present new mode of encryption for block cipher called all-or-nothing encryption. This mode has the interesting property that one must decrypt the entire ciphertext into plaintext before one can determine even single message block. All-or-nothing encryption
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1932 integrated in existing dispersed storage system. Bastion only incurs a negligible performance deterioration (less than 5%) when compared to symmetric encryption schemes, and considerably improves the performance of existing All-or-nothing encryption schemes. 3. CONCLUSIONS This paper addressed different cryptographic schemes that resolve the problem of key exposure. After reviewing all the above defined cryptographic schemes it can be concluded that Bastion is more efficient scheme than the All-or-nothing encryption scheme. Bastion require only one round of encryption and it incur a negligible percentage of overhead compared to other encryption scheme. In cloud storage auditing scheme the key exposure in one time period doesn’t affect the security of cloud storage auditing in other time periods. In future we will propose a scheme which the combination of all-or-nothing and Bastion scheme that strongly overcome the key exposure problem and also reduces the overhead. REFERENCES [1] R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, “Deniable Encryption,” in Proceedings of CRYPTO, 1997. [2] M. K. Aguilera, R. Janakiraman, and L. Xu, “Using Erasure Codes Efficiently for Storage in a Distributed System,” in International Conference on Dependable Systems and Networks (DSN), 2005, pp. 336–345. [3] R. L. Rivest, “All-or-Nothing Encryption and the Package Transform,” in International Workshop on Fast Software Encryption (FSE), 1997, pp. 210–218. [4] A. Desai, “The security of all-or-nothing encryption: Protecting against exhaustive key search,” in Advances in Cryptology (CRYPTO), 2000, pp. 359–375. [5] J. K. Resch and J. S. Plank, “AONT-RS: Blending Security and Performance in Dispersed Storage Systems,” in USENIX Conference on File and Storage Technologies (FAST), 2011, pp. 191–202. [6] A. Beimel, “Secret-sharing schemes: A survey,” in International Workshop on Coding and Cryptology (IWCC), 2011, pp. 11–46. [7] S. Micali and L. Reyzin, “Physically observable cryptography (extended abstract),” in Theory of Cryptography Conference (TCC), 2004, pp. 278–296. [8] Jia Yu and Huaqan Wang. “Strong Key-Exposure Resilient Auditing for Secure Cloud Storage,” in IEEE Transaction on Information Forensics and Security, Vol., No., 2016. [9] Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” Proc.IEEE INFOCOM’10, pp. 534-542, 2010 [10] Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun, “Securing Cloud Data under Key Exposure,” IEEE Transaction on Cloud Computing 2017. [11] Anup Mathew, “Survey Paper on Security & Privacy Issues in Cloud Storage Systems,” EECE 571B, Term Survey Paper,April 2012. [12] Y. Chen and R. Sion, “On Securing untrusted clouds with cryptography,” In Processings of 9th annual ACM workshop on Privacy in the electronicsociety, pp.109- 114, ACM WPES’10,2010 [13] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, Dept. of ECE, ILLinois Inst. Of Technology, “Ensuring data storage security in cloud computing,” 17th International Workshop on Quality of Service,2009 [14] K. Yang and X. Jia, “Attributed-Based Access Control for MultiAuthority Systems in Cloud Storage,” Proc. IEEE 32nd Int’l Conf. Distributed Computing Systems (ICDCS), pp. 536-545, 2012. [15] G. Zhao, C. Rong, J. Li, F. Zhang, and Y. Tang, “Trusted Data Sharing over Untrusted Cloud Storage Providers,” Proc. IEEE Second Int’l Conf. Cloud Computing Technology and Science (CLOUDCOM ’10), pp. 97-103, 2010 [16] P.K. Tysowski and M.A. Hasan, “Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems,” Technical Report 33, Centre for Applied Cryptographic Research (CACR), Univ. of Waterloo, 2011. [17] Q. Liu, G. Wang, and J. Wu, “Clock-Based Proxy Re- Encryption Scheme in Unreliable Clouds,” Proc. 41st Int’l Conf. Parallel Processing Workshops (ICPPW), pp. 304-305, Sept. 2012. [18] P.K. Tysowski and M.A. Hasan, “Hybrid Attribute- Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds,” Technical Report 13, Centre for Applied Cryptographic Research (CACR), Univ. of Waterloo, 2013.