Vol. 3, Special Issue 2 (2018)
Confidential and secure key exposure in cloud environments
Author(s): Pooja Vijay Bankar
Abstract: Present day statistics display a powerful attacker which breaks information confidentiality with the useful resource of acquiring cryptographic keys, thru the use of using way of coercion or backdoors in cryptographic software program application. On this paper, we positioned statistics confidentiality in opposition to an adversary to know the encryption key and has get admission to a massive fraction of the cipher text blocks. We've studied statistics confidentiality in opposition to an attacker who would possibly understand the encryption key. To this end, we endorse Bastion and modified RSA algorithm, a singular and green scheme that guarantees data confidentiality even supposing the encryption keys leaked and the adversary has access to almost all cipher text blocks. We have re-encrypted the cipher text formed by way of Bastion using modified RSA set of rules and encryption key have divided inside the blocks which might be on distinct servers. In order that although the adversary attempts to get the encryption key, he'll get half a part of the key and statistics confidentiality is preserved.
Please use another browser.