Secure data storage in cloud computing to avoiding some cipher text attack

Abstract Nowadays, cloud computing has become popular for storage of data. Yet, flexibility and security are the significant parameters for better transmission. Sharing data with others may lead to security and flexibility issues. Key cryptosystem is a technique in which, decryption rights for a set of cipher texts are efficiently assigned. Key aggregation will be performed by the power of all keys, when they are aggregated. But the delegated keys or aggregate keys stored in the mobile device are prompt to leakage. Hence, we need to design a leakage-resilient cryptosystem which reduces key leakage attacks. For leakage-resilient cryptosystem, we propose Hash-Proof System techniques; which will be applied on chosen cipher text key leakages and other key leakages. A number of cipher text classes are predefined in our approach.

[1]  Emmanuel Prouff,et al.  Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols , 2011, CHES.

[2]  Moni Naor,et al.  Public-Key Cryptosystems Resilient to Key Leakage , 2012, SIAM J. Comput..

[3]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[4]  François-Xavier Standaert,et al.  Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions , 2013, IACR Cryptol. ePrint Arch..

[5]  Srivaths Ravi,et al.  Satisfiability-based Framework for Enabling Side-channel Attacks on Cryptographic Software , 2006, Proceedings of the Design Automation & Test in Europe Conference.

[6]  Siu-Ming Yiu,et al.  SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment , 2012, ACNS.

[7]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[8]  Rafail Ostrovsky,et al.  Perfect Non-Interactive Zero Knowledge for NP , 2006, IACR Cryptol. ePrint Arch..

[9]  Yevgeniy Vahlis,et al.  On Protecting Cryptographic Keys Against Continual Leakage , 2010, IACR Cryptol. ePrint Arch..

[10]  Carmit Hazay,et al.  Leakage-Resilient Cryptography from Minimal Assumptions , 2015, Journal of Cryptology.

[11]  Vinod Vaikuntanathan,et al.  Signature Schemes with Bounded Leakage Resilience , 2009, ASIACRYPT.

[12]  François-Xavier Standaert,et al.  Adaptive Chosen-Message Side-Channel Attacks , 2010, ACNS.

[13]  Christophe Clavier,et al.  Differential Power Analysis in the Presence of Hardware Countermeasures , 2000, CHES.