Skip to content

Improving Cloud Security Systems using Threshold Cryptography

License

Notifications You must be signed in to change notification settings

avats101/LockNKey

Repository files navigation

LockNKey

Improving Cloud Security Systems using Threshold Cryptography

While data is being uploaded to cloud storage, it is vulnerable to attacks. It can be tampered with or stolen. Thus before uploading, this project aims to secure the data with the concept of threshold cryptography using the RSA algorithm. The processes such as Shamir’s Secret Sharing and Lagrange Interpolation Method have been used to further increase and improve the security of the data being stored. In this approach, there is no need for a user certification mechanism between user and Distributed Data Centers. Other approaches assume that there is a certification mechanism which in case if isn't present then there exists a threat that encryption key may be leaked by the malicious user who acquired the hardware wallet(storing the keys) lost by the user, since it is possible to collect at least t number of optional key fragments.

The user will be required to set up their Google Drive credentials to login into their account. Then the user can select whether they want to encrypt and upload or download and decrypt. If the user chooses to encrypt, the user’s data will be encrypted using a modified RSA algorithm which uses Proth and Mersenne prime numbers for additional security. The private key generated is then split up into smaller parts or shares which can be stored at different places. The user must store these shares safely to decrypt the files. When the user wants to decrypt the data he will require the minimum number of keys i.e. k out of the N total shares and then they can be used to recreate the private key using the Lagrange interpolation algorithm which allows us to reconstruct any polynomial of degree K-1 from K points on its curve. Thus the system is even more protected since an attacker will not be able to decode the data even if he has as many as k-1 shares. Current Implementation includes a GUI based application and uses Google Drive for cloud support.

Read the full paper at IEEE Xplore for more information.

Flow chart

Encrypt

Decrypt

Comparison Study of Propopsed Algorithm

Citation

@inproceedings{vats2022locknkey,
  title={LockNKey: Improvised Cloud Storage System using Threshold Cryptography Approach},
  author={Vats, Aryan and Jimmy, Praneel and Mishra, Arohan and Aju, D},
  booktitle={2022 2nd International Conference on Emerging Smart Technologies and Applications (eSmarTA)},
  pages={1--6},
  year={2022},
  organization={IEEE}
}

Contributors

About

Improving Cloud Security Systems using Threshold Cryptography

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages