A Threshold Secure Data Sharing Scheme for Federated Clouds

Download Full Text
Author(s):
K.Venkataramana, Dr. M. Padmavathamma
Published Date:
September 05, 2012
Issue:
Volume 2, Issue 5
Page(s):
21 - 28
DOI:
10.7815/ijorcs.25.2012.044
Views:
5216
Downloads:
373

Keywords:
cloud computing, federated clouds, secure data sharing, smc, wrf, encrypted secret, primitive polynomial, primitive number.
Citation:
K.Venkataramana, Dr. M. Padmavathamma, "A Threshold Secure Data Sharing Scheme for Federated Clouds". International Journal of Research in Computer Science, 2 (5): pp. 21-28, September 2012. doi:10.7815/ijorcs.25.2012.044 Other Formats

Abstract

Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost. To offer high QOS to customers according SLA, cloud services broker or cloud service provider uses individual cloud providers that work collaboratively to form a federation of clouds. It is required in applications like Real-time online interactive applications, weather research and forecasting etc., in which the data and applications are complex and distributed. In these applications secret data should be shared, so secure data sharing mechanism is required in Federated clouds to reduce the risk of data intrusion, the loss of service availability and to ensure data integrity. So In this paper we have proposed zero knowledge data sharing scheme where Trusted Cloud Authority (TCA) will control federated clouds for data sharing where the secret to be exchanged for computation is encrypted and retrieved by individual cloud at the end. Our scheme is based on the difficulty of solving the Discrete Logarithm problem (DLOG) in a finite abelian group of large prime order which is NP-Hard. So our proposed scheme provides data integrity in transit, data availability when one of host providers are not available during the computation.

  1. Recommendations of National Institute of Standards and Technology [online]. Available http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
  2. Cloud computing. Wikipedia. [online]. Available at http://en.wikipedia.org/wiki/Cloud_computing.
  3. July 2010,Cloud Computing Use Cases, A white paper produced by the Cloud Computing Use Case Discussion Group, Version 4.0 .[online].Available. http://cloudusecases.org.
  4. Rajkumar Buyya, Rajiv Ranjan, and Rodrigo N. Calheiros,”InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services”, ICA3PP,2010,Part I, LNCS 6081, Springer, 2010, pp. 13–31. doi: 10.1007/978-3-642-13119-6_2
  5. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications (2011), pp. 1-11. doi: 10.1016/j.jnca.2010.07.006
  6. Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud Computing”, V2.1, 2009.
  7. Dec, 2011,”Federated identity management”,[Online], [Available],http://en.wikipedia.org/wiki/Federated_identity_management
  8. Xiao Zhang; Hong-tao Du; Jian-quan Chen; Yi Lin; Lei-jie Zeng,"Ensure Data Security in Cloud Storage", Network Computing and Information Security (NCIS), International Conference (IEEE),vol.1,14-15 May,2011 pp.284- 287. doi: 10.1109/NCIS.2011.64
  9. David Villegas, Norman Boboroff, Ivan Rodero, Javier Delgado, yanbin Liu, Aditya.D, Liana Fong, S.Masoud Sajadi, ManishP ,“Cloud federation in a layered service model”,Journal of Computer and System sciences, Elsevier, 2012. doi: 10.1016/j.jcss.2011.12.017
  10. M. A. AlZain and E. Pardede, “Using Multi Shares for Ensuring Privacy in Database-as-a-Service”, 44th Hawaii, International Conference on System Sciences (HICSS),2011,pp 1-9. doi: 10.1109/HICSS.2011.478
  11. David Bernstein, DeepakVij, “Intercloud Security Considerations”, 2nd IEEE International Conference on Cloud Computing Technology and Science, doi: 10.1109/ CloudCom.2010.82. doi: 10.1109/ CloudCom. 2010.82
  12. A. Shamir, “How to share a secret”, Communication. ACM, 22 (1979), pp. 612-613. doi: 10.1145/359168.359176

  • Abdallah, Aisha, and Mazleena Salleh. "Analysis and Comparison the Security and Performance of Secret Sharing Schemes." Asian Journal of Information Technology 14.2 (2015): 74-83.
  • Yang, Yu, Chenggui Zhao, and Tilei Gao. "Cloud Computing: Security Issues Overview and Solving Techniques Investigation." Intelligent Cloud Computing. Springer International Publishing, 2014. 152-167.