Securing Cloud Data under Key Exposure - 2017


Recent news reveal a powerful attacker which breaks knowledge confidentiality by acquiring cryptographic keys, by suggests that of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the sole viable measure to preserve knowledge confidentiality is to limit the attacker’s access to the ciphertext. This might be achieved, for example, by spreading ciphertext blocks across servers in multiple administrative domains—thus assuming that the adversary cannot compromise all of them. Nevertheless, if data is encrypted with existing schemes, an adversary equipped with the encryption key, can still compromise a single server and decrypt the ciphertext blocks stored therein. In this paper, we tend to study data confidentiality against an adversary which knows the encryption key and has access to a massive fraction of the ciphertext blocks. To the current finish, we tend to propose Bastion, a completely unique and economical theme that guarantees knowledge confidentiality whether or not the encryption secret's leaked and also the adversary has access to almost all ciphertext blocks. We analyze the protection of Bastion, and we tend to evaluate its performance by means that of a prototype implementation. We tend to additionally discuss sensible insights with respect to the integration of Bastion in industrial dispersed storage systems. Our evaluation results recommend that Bastion is well-suited to integration in existing systems since it incurs but fivepercent overhead compared to existing semantically secure encryption modes.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Securing Real-Time Video Surveillance Data in Vehicular Cloud Computing: A Survey ABSTRACT: The concept of vehicular ad hoc networks, or VANETs, has attracted a lot of attention recently, particularly in the
PROJECT TITLE : A Patient-Centric Healthcare Framework Reference Architecture for Better Semantic Interoperability based on Blockchain, Cloud, and IoT ABSTRACT: The application-centric perspective gives rise to the distributed
PROJECT TITLE :Securing Visible Light Communication Systems by Beamforming in the Presence of Randomly Distributed Eavesdroppers - 2018ABSTRACT:This Project considers secrecy enhancement mechanisms in visible light communication
PROJECT TITLE : ART An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks - 2017 ABSTRACT: Vehicular impromptu networks (VANETs) have the potential to transform the approach individuals travel through
PROJECT TITLE : ART An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks - 2016 ABSTRACT: Vehicular impromptu networks (VANETs) have the potential to rework the way people travel through the

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry