A Secured Data Storage in Cloud Computing by Using Block Design Based Key Agreement
DOI:
https://doi.org/10.32628/CSEIT23902102Keywords:
Key Agreement Protocol, Symmetric Balanced Incomplete Block Design, Data Sharing, Cloud Computing.Abstract
Cloud computing has emerged as a dominant paradigm for storing and accessing data. In group data sharing scenarios, where multiple users collaborate and exchange sensitive information in the cloud, ensuring secure and efficient key agreement becomes crucial. This paper presents a comprehensive analysis of key agreement mechanisms for group data sharing in cloud computing environments. We explore various cryptographic techniques and protocols specifically designed for establishing secure communication channels among group members. The paper discusses the challenges associated with key agreement in the cloud, proposes potential solutions, and provides insights into the implementation and evaluation of such mechanisms. The proposed framework aims to protect data confidentiality, integrity, and availability, ensuring a robust and reliable cloud storage environment. We explore various cryptographic techniques, including encryption, key management, and authentication mechanisms, and discuss their application in securing cloud-based data storage. The framework addresses common security threats and provides guidelines for implementing a secure cloud storage solution.
References
- B. Dan and M. Franklin, “Identity-based encryption from the Weill pairing,” Siam Journal on Computing, vol. 32, no. 3, pp. 213–229, 2003.
- S. Blakewilson, D. Johnson, and A. Menezes, “Key agreement protocols and their security analysis,” in IMA International Conference on Cryptography and Coding, 1997, pp. 30–45.
- I. Chung and Y. Bae, “The design of an efficient load balancing algorithm employing block design,” Journal of Applied Mathematics and Computing, vol. 14, no. 1, pp. 343–351, 2004.
- O. Lee, S. Yoo, B. Park, and I. Chung, “The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design.” Information Sciences, vol. 176, no. 15, pp. 2148–2160, 2006.
- R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 79–88, 2011.
- Ravindra Changala, “Secured Activity Based Authentication System” in " in Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1,Pages 1-4, September 2016.ISSN: 2455-3506.
- N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222–233, 2014.
- H. Guo, Z. Li, Y. Mu, and X. Zhang, “Cryptanalysis of simple three-party key exchange protocol,” Computers and Security, vol. 27, no. 1-2, pp. 16–21, 2008.
- Z. Tan, “An enhanced three-party authentication key exchange protocol for mobile commerce environments,” Journal of Communications, vol. 5, no. 5, pp. 436–443, 2010.
- Y. M. Tseng, “An efficient two-party identity-based key exchange protocol.” Informatica, vol. 18, no. 1, pp. 125–136, 2007.
- Ravindra Changala, "Retrieval of Valid Information from Clustered and Distributed Databases" in Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1, Pages 21-25, September 2016.ISSN: 2455-3506.
- A. Shamir, “Identity-based cryptosystems and signature schemes,” Lecture Notes in Computer Science, vol. 21, no. 2, pp. 47–53, 1985.
- E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater,“Provably authenticated group diffie-hellman key exchange,” AcmTransactions on Information and System Security, vol. 10, no. 3, pp.89–92, 2001.
- Ravindra Changala, “Diminution of Deployment Issues in Secure Multicast System with Group Key Management” published in International Journal of Computer Application (IJCA), Impact Factor 2.52, ISSN No: 2250-1797, Volume 2, Issue 3, June 2012.
- D. R. Stinson, Combinatorial designs: constructions and analysis. Springer Science and Business Media, 2007.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.