Secret sharing scheme for key management of secure data sharing in cloud

Cloud computing is no longer a new phenomenon in the industry. Cloud storage is an important milestone in the cloud computing industry and one of the security features that were introduced in cloud storage is via cryptographic methods to control the access only to authorized users. One of the known...

Full description

Saved in:
Bibliographic Details
Main Author: Abd Majid, Noorhafezan
Format: Thesis
Language:English
Published: 2019
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/82796/1/FSKTM%202019%2043%20IR.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.82796
record_format uketd_dc
spelling my-upm-ir.827962020-07-14T02:09:11Z Secret sharing scheme for key management of secure data sharing in cloud 2019-06 Abd Majid, Noorhafezan Cloud computing is no longer a new phenomenon in the industry. Cloud storage is an important milestone in the cloud computing industry and one of the security features that were introduced in cloud storage is via cryptographic methods to control the access only to authorized users. One of the known issues in cloud storage is the high key generation time for large-scale users and limiting the use of cryptography for data encryption. This problem can be overcome by using cryptography uses a single key, but another problem will arises is the potential for a single point of vulnerability if the key fell in the hands of unauthorized persons, then the whole secret and information can be compromised. The objectives of this study were to execute and analyze key generation times for large-scale users using the AES-256 method and Shamir's Secret Sharing Scheme, which both are still using a single key concept and prove Shamir’s Secret Sharing Scheme is more suitable for large-scale users. Further testing proves that Shamir's Secret Sharing Scheme is more appropriate for large-scale users covering key generation and thresholds to ensure data is completely secure. There are five (5) phases for this study, identify problems and requirement analysis, design and analysis, design an algorithm, code development and result analysis, and documentations. The test run in localhost by using PHP platform and there are additional components such as the Composer for the implementation of Shamir's Secret Sharing Scheme and the comparison will be recorded based on the two data types, number of users and file size. Based on the results of the tests, it can be proved that Shamir's Secret Sharing Scheme provides key generation times faster than AES-256, and strengthen by the control of key threshold to ensure that the stored data is more secure. Shamir's Secret Sharing Scheme has also denied the problem of point the vulnerability exist in the AES-256. Data encryption (Computer science) Database security 2019-06 Thesis http://psasir.upm.edu.my/id/eprint/82796/ http://psasir.upm.edu.my/id/eprint/82796/1/FSKTM%202019%2043%20IR.pdf text en public masters Universiti Putra Malaysia Data encryption (Computer science) Database security Md Yasin, Sharifah
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
advisor Md Yasin, Sharifah
topic Data encryption (Computer science)
Database security

spellingShingle Data encryption (Computer science)
Database security

Abd Majid, Noorhafezan
Secret sharing scheme for key management of secure data sharing in cloud
description Cloud computing is no longer a new phenomenon in the industry. Cloud storage is an important milestone in the cloud computing industry and one of the security features that were introduced in cloud storage is via cryptographic methods to control the access only to authorized users. One of the known issues in cloud storage is the high key generation time for large-scale users and limiting the use of cryptography for data encryption. This problem can be overcome by using cryptography uses a single key, but another problem will arises is the potential for a single point of vulnerability if the key fell in the hands of unauthorized persons, then the whole secret and information can be compromised. The objectives of this study were to execute and analyze key generation times for large-scale users using the AES-256 method and Shamir's Secret Sharing Scheme, which both are still using a single key concept and prove Shamir’s Secret Sharing Scheme is more suitable for large-scale users. Further testing proves that Shamir's Secret Sharing Scheme is more appropriate for large-scale users covering key generation and thresholds to ensure data is completely secure. There are five (5) phases for this study, identify problems and requirement analysis, design and analysis, design an algorithm, code development and result analysis, and documentations. The test run in localhost by using PHP platform and there are additional components such as the Composer for the implementation of Shamir's Secret Sharing Scheme and the comparison will be recorded based on the two data types, number of users and file size. Based on the results of the tests, it can be proved that Shamir's Secret Sharing Scheme provides key generation times faster than AES-256, and strengthen by the control of key threshold to ensure that the stored data is more secure. Shamir's Secret Sharing Scheme has also denied the problem of point the vulnerability exist in the AES-256.
format Thesis
qualification_level Master's degree
author Abd Majid, Noorhafezan
author_facet Abd Majid, Noorhafezan
author_sort Abd Majid, Noorhafezan
title Secret sharing scheme for key management of secure data sharing in cloud
title_short Secret sharing scheme for key management of secure data sharing in cloud
title_full Secret sharing scheme for key management of secure data sharing in cloud
title_fullStr Secret sharing scheme for key management of secure data sharing in cloud
title_full_unstemmed Secret sharing scheme for key management of secure data sharing in cloud
title_sort secret sharing scheme for key management of secure data sharing in cloud
granting_institution Universiti Putra Malaysia
publishDate 2019
url http://psasir.upm.edu.my/id/eprint/82796/1/FSKTM%202019%2043%20IR.pdf
_version_ 1747813320717500416