A Secured Data Storage in Cloud Computing by Using Block Design Based Key Agreement

Authors

  • Kamparapu Bhanu Rajesh Naidu  Assistant Professor, Department of Computer Science &Technology, Madanapalle Institute of Technology & Science, Madanapalle, Andhra Pradesh, India
  • M V Anjana Devi  Associate Professor, CSE(AI&ML) Department, Guru Nanak Institutions Technical Campus, Hyderabad, India
  • Pragathi Vulpala  Assistant Professor, CSE Department, TKR college of engineering and technology, Hyderabad, India
  • Dr. Mahesh Kotha  Associate Professor, Department of CSE (AI&ML), CMR Technical Campus, Hyderabad, India

DOI:

https://doi.org/10.32628/CSEIT23902102

Keywords:

Key Agreement Protocol, Symmetric Balanced Incomplete Block Design, Data Sharing, Cloud Computing.

Abstract

Cloud computing has emerged as a dominant paradigm for storing and accessing data. In group data sharing scenarios, where multiple users collaborate and exchange sensitive information in the cloud, ensuring secure and efficient key agreement becomes crucial. This paper presents a comprehensive analysis of key agreement mechanisms for group data sharing in cloud computing environments. We explore various cryptographic techniques and protocols specifically designed for establishing secure communication channels among group members. The paper discusses the challenges associated with key agreement in the cloud, proposes potential solutions, and provides insights into the implementation and evaluation of such mechanisms. The proposed framework aims to protect data confidentiality, integrity, and availability, ensuring a robust and reliable cloud storage environment. We explore various cryptographic techniques, including encryption, key management, and authentication mechanisms, and discuss their application in securing cloud-based data storage. The framework addresses common security threats and provides guidelines for implementing a secure cloud storage solution.

References

  1. B. Dan and M. Franklin, “Identity-based encryption from the Weill pairing,” Siam Journal on Computing, vol. 32, no. 3, pp. 213–229, 2003.
  2. S. Blakewilson, D. Johnson, and A. Menezes, “Key agreement protocols and their security analysis,” in IMA International Conference on Cryptography and Coding, 1997, pp. 30–45.
  3. I. Chung and Y. Bae, “The design of an efficient load balancing algorithm employing block design,” Journal of Applied Mathematics and Computing, vol. 14, no. 1, pp. 343–351, 2004.
  4. O. Lee, S. Yoo, B. Park, and I. Chung, “The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design.” Information Sciences, vol. 176, no. 15, pp. 2148–2160, 2006.
  5. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 79–88, 2011.
  6. Ravindra Changala, “Secured Activity Based Authentication System” in " in Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1,Pages 1-4, September 2016.ISSN: 2455-3506.
  7. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222–233, 2014.
  8. H. Guo, Z. Li, Y. Mu, and X. Zhang, “Cryptanalysis of simple three-party key exchange protocol,” Computers and Security, vol. 27, no. 1-2, pp. 16–21, 2008.
  9. Z. Tan, “An enhanced three-party authentication key exchange protocol for mobile commerce environments,” Journal of Communications, vol. 5, no. 5, pp. 436–443, 2010.
  10. Y. M. Tseng, “An efficient two-party identity-based key exchange protocol.” Informatica, vol. 18, no. 1, pp. 125–136, 2007.
  11. Ravindra Changala, "Retrieval of Valid Information from Clustered and Distributed Databases" in Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1, Pages 21-25, September 2016.ISSN: 2455-3506.
  12. A. Shamir, “Identity-based cryptosystems and signature schemes,” Lecture Notes in Computer Science, vol. 21, no. 2, pp. 47–53, 1985.
  13. E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater,“Provably authenticated group diffie-hellman key exchange,” AcmTransactions on Information and System Security, vol. 10, no. 3, pp.89–92, 2001.
  14. Ravindra Changala, “Diminution of Deployment Issues in Secure Multicast System with Group Key Management” published in International Journal of Computer Application (IJCA), Impact Factor 2.52, ISSN No: 2250-1797, Volume 2, Issue 3, June 2012.
  15. D. R. Stinson, Combinatorial designs: constructions and analysis. Springer Science and Business Media, 2007.

Downloads

Published

2023-08-30

Issue

Section

Research Articles

How to Cite

[1]
Kamparapu Bhanu Rajesh Naidu, M V Anjana Devi, Pragathi Vulpala, Dr. Mahesh Kotha, " A Secured Data Storage in Cloud Computing by Using Block Design Based Key Agreement" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 4, pp.231-240, July-August-2023. Available at doi : https://doi.org/10.32628/CSEIT23902102