Reference Hub4
Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing

Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing

Shahin Fatima, Shish Ahmad
Copyright: © 2020 |Volume: 16 |Issue: 1 |Pages: 15
ISSN: 1548-3673|EISSN: 1548-3681|EISBN13: 9781799805151|DOI: 10.4018/IJeC.2020010101
Cite Article Cite Article

MLA

Fatima, Shahin, and Shish Ahmad. "Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing." IJEC vol.16, no.1 2020: pp.1-15. http://doi.org/10.4018/IJeC.2020010101

APA

Fatima, S. & Ahmad, S. (2020). Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing. International Journal of e-Collaboration (IJeC), 16(1), 1-15. http://doi.org/10.4018/IJeC.2020010101

Chicago

Fatima, Shahin, and Shish Ahmad. "Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing," International Journal of e-Collaboration (IJeC) 16, no.1: 1-15. http://doi.org/10.4018/IJeC.2020010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security is a crucial problem in Cloud computing. Storing and accessing the data in the Cloud is very popular nowadays but the security of data is still lagging behind. Secret sharing schemes are widely used to improve the security of data. In this article, a threshold secret sharing scheme using Newton divided difference interpolating polynomial (TSSNIP) is proposed in a distributed Cloud environment to enhance security of keys used for encryption. The proposed method uses a Newton divided difference interpolating polynomial for key splitting and key reconstruction. A threshold value is used to reconstruct the shares in secret sharing schemes. The proposed work made use of dynamic and random threshold generation method to ensure security of key. The experimental output shows reduced execution time, better security, efficiency, and robustness in the proposed scheme. Furthermore, the proposed scheme also outperformed other secret sharing schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.