Research Article Open Access

METADATA DRIVEN EFFICIENT KEY GENERATION AND DISTRIBUTION IN CLOUD SECURITY

R. Anitha1 and Saswati Mukherjee1
  • 1 Anna University, India
Journal of Computer Science
Volume 10 No. 10, 2014, 1929-1938

DOI: https://doi.org/10.3844/jcssp.2014.1929.1938

Submitted On: 27 December 2013 Published On: 12 May 2014

How to Cite: Anitha, R. & Mukherjee, S. (2014). METADATA DRIVEN EFFICIENT KEY GENERATION AND DISTRIBUTION IN CLOUD SECURITY. Journal of Computer Science, 10(10), 1929-1938. https://doi.org/10.3844/jcssp.2014.1929.1938

Abstract

With rapid development of cloud computing to a greater extent IT industries outsource their sensitive data at cloud data storage location. To keep the stored data confidential against untrusted cloud service providers, a natural way is to store only encrypted data in the cloud severs and providing an efficient access control mechanism using a competent cipher key-Cmxn, which is becoming a promising cryptographic solution. In this proposed model the cipher key is generated based on attributes of metadata. The key problems of this approach includes, the generation of cipher key-Cmxn and establishing an access control mechanism for the encrypted data using cipher key, where keys cannot be revoked without the involvement of data owner and the Metadata Data Server (MDS), hence makes data owner feels comfortable about the data stored. From this study, we propose a novel Metadata driven efficient key generation and distribution policies for cloud data security system by exploiting the characteristic of the metadata stored. Our design enforces security by providing two novel features. 1. Generation of Cipher key-Cmxn using modified feistel network, which holds good for the avalanche effect as each round of the feistel function, depends on the previous round. 2. A novel key distribution policy is designed where the encryption and decryption keys cannot be compromised without the involvement of data owner and the Metadata Data Server (MDS), hence makes data owner comfortable about the data stored. We have implemented a security model that incorporates our ideas and evaluated the performance and scalability of the secured model.

  • 859 Views
  • 1,533 Downloads
  • 1 Citations

Download

Keywords

  • Security
  • Data Storage
  • Metadata
  • Cloud
  • Feistel Function
  • Steganography