z-logo
open-access-imgOpen Access
Finding the Optimal Value for Threshold Cryptography on Cloud Computing
Author(s) -
Weena Janratchakool,
Sirapat Boonkrong,
Sucha Smanchat
Publication year - 2016
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v6i6.pp2979-2988
Subject(s) - cloud computing , computer science , key (lock) , cryptography , key generation , key distribution , virtual machine , cloudsim , distributed computing , value (mathematics) , public key cryptography , computer security , encryption , operating system , machine learning
The objective of using threshold cryptography on cloud environment is to protect the keys, which are the most important elements in cryptographic systems. Threshold cryptography works by dividing the private key to a number of shares, according to the number of virtual machines, then distributing them each share to each virtual machine. In order to generate the key back, not all the shares are needed. Howerver, the problem is that there has been no research attemping to find a suitable threshold value for key reconstruction. Therefore, this paper presented a guildline designed and implemented that can assist to choose such value. The experiment was setup using CloudSim to simulate cloud environment and collecting time taken in key distribution and key reconstruction process to achieve the optimal threshold value.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here