Secret sharing scheme for key management of secure data sharing in cloud

Cloud computing is no longer a new phenomenon in the industry. Cloud storage is an important milestone in the cloud computing industry and one of the security features that were introduced in cloud storage is via cryptographic methods to control the access only to authorized users. One of the known...

詳細記述

保存先:
書誌詳細
第一著者: Abd Majid, Noorhafezan
フォーマット: 学位論文
言語:English
出版事項: 2019
オンライン・アクセス:http://ethesis.upm.edu.my/id/eprint/13981/1/FSKTM%202019%2043%20T.pdf
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
id oai:ethesis.upm.edu.my:13981
record_format eprints
spelling oai:ethesis.upm.edu.my:13981 http://ethesis.upm.edu.my/id/eprint/13981/ Secret sharing scheme for key management of secure data sharing in cloud Abd Majid, Noorhafezan Cloud computing is no longer a new phenomenon in the industry. Cloud storage is an important milestone in the cloud computing industry and one of the security features that were introduced in cloud storage is via cryptographic methods to control the access only to authorized users. One of the known issues in cloud storage is the high key generation time for large-scale users and limiting the use of cryptography for data encryption. This problem can be overcome by using cryptography uses a single key, but another problem will arises is the potential for a single point of vulnerability if the key fell in the hands of unauthorized persons, then the whole secret and information can be compromised. The objectives of this study were to execute and analyze key generation times for large-scale users using the AES-256 method and Shamir's Secret Sharing Scheme, which both are still using a single key concept and prove Shamir’s Secret Sharing Scheme is more suitable for large-scale users. Further testing proves that Shamir's Secret Sharing Scheme is more appropriate for large-scale users covering key generation and thresholds to ensure data is completely secure. There are five (5) phases for this study, identify problems and requirement analysis, design and analysis, design an algorithm, code development and result analysis, and documentations. The test run in localhost by using PHP platform and there are additional components such as the Composer for the implementation of Shamir's Secret Sharing Scheme and the comparison will be recorded based on the two data types, number of users and file size. Based on the results of the tests, it can be proved that Shamir's Secret Sharing Scheme provides key generation times faster than AES-256, and strengthen by the control of key threshold to ensure that the stored data is more secure. Shamir's Secret Sharing Scheme has also denied the problem of point the vulnerability exist in the AES-256. 2019-06 Thesis NonPeerReviewed text en http://ethesis.upm.edu.my/id/eprint/13981/1/FSKTM%202019%2043%20T.pdf Abd Majid, Noorhafezan (2019) Secret sharing scheme for key management of secure data sharing in cloud. Masters thesis, Universiti Putra Malaysia. (FSKTM 2019 43).
institution UPM eTHESES
collection UPM eTHESES
language English
description Cloud computing is no longer a new phenomenon in the industry. Cloud storage is an important milestone in the cloud computing industry and one of the security features that were introduced in cloud storage is via cryptographic methods to control the access only to authorized users. One of the known issues in cloud storage is the high key generation time for large-scale users and limiting the use of cryptography for data encryption. This problem can be overcome by using cryptography uses a single key, but another problem will arises is the potential for a single point of vulnerability if the key fell in the hands of unauthorized persons, then the whole secret and information can be compromised. The objectives of this study were to execute and analyze key generation times for large-scale users using the AES-256 method and Shamir's Secret Sharing Scheme, which both are still using a single key concept and prove Shamir’s Secret Sharing Scheme is more suitable for large-scale users. Further testing proves that Shamir's Secret Sharing Scheme is more appropriate for large-scale users covering key generation and thresholds to ensure data is completely secure. There are five (5) phases for this study, identify problems and requirement analysis, design and analysis, design an algorithm, code development and result analysis, and documentations. The test run in localhost by using PHP platform and there are additional components such as the Composer for the implementation of Shamir's Secret Sharing Scheme and the comparison will be recorded based on the two data types, number of users and file size. Based on the results of the tests, it can be proved that Shamir's Secret Sharing Scheme provides key generation times faster than AES-256, and strengthen by the control of key threshold to ensure that the stored data is more secure. Shamir's Secret Sharing Scheme has also denied the problem of point the vulnerability exist in the AES-256.
format Thesis
author Abd Majid, Noorhafezan
spellingShingle Abd Majid, Noorhafezan
Secret sharing scheme for key management of secure data sharing in cloud
author_facet Abd Majid, Noorhafezan
author_sort Abd Majid, Noorhafezan
title Secret sharing scheme for key management of secure data sharing in cloud
title_short Secret sharing scheme for key management of secure data sharing in cloud
title_full Secret sharing scheme for key management of secure data sharing in cloud
title_fullStr Secret sharing scheme for key management of secure data sharing in cloud
title_full_unstemmed Secret sharing scheme for key management of secure data sharing in cloud
title_sort secret sharing scheme for key management of secure data sharing in cloud
publishDate 2019
url http://ethesis.upm.edu.my/id/eprint/13981/1/FSKTM%202019%2043%20T.pdf
_version_ 1819311505459380224
score 13.4562235