Reference Hub1
A Secure Data Transfer Approach With an Efficient Key Management Over Cloud

A Secure Data Transfer Approach With an Efficient Key Management Over Cloud

Lalit Mohan Gupta, Hitendra Garg, Abdus Samad
Copyright: © 2022 |Volume: 17 |Issue: 1 |Pages: 21
ISSN: 1554-1045|EISSN: 1554-1053|EISBN13: 9781799894001|DOI: 10.4018/IJITWE.306917
Cite Article Cite Article

MLA

Gupta, Lalit Mohan, et al. "A Secure Data Transfer Approach With an Efficient Key Management Over Cloud." IJITWE vol.17, no.1 2022: pp.1-21. http://doi.org/10.4018/IJITWE.306917

APA

Gupta, L. M., Garg, H., & Samad, A. (2022). A Secure Data Transfer Approach With an Efficient Key Management Over Cloud. International Journal of Information Technology and Web Engineering (IJITWE), 17(1), 1-21. http://doi.org/10.4018/IJITWE.306917

Chicago

Gupta, Lalit Mohan, Hitendra Garg, and Abdus Samad. "A Secure Data Transfer Approach With an Efficient Key Management Over Cloud," International Journal of Information Technology and Web Engineering (IJITWE) 17, no.1: 1-21. http://doi.org/10.4018/IJITWE.306917

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The growth in the number of cloud users who transfer their health data have enhanced the importance of cloud technology's services and capabilities. However, transferring patient health data to the cloud leaves researchers with several concerns and obstacles in privacy, storage, access, key-formation, and management. The paper presents an efficient methodology for storing and accessing health information to and from the cloud. The symmetric key cryptography with the MD5 hash function is employed to enhance the framework's efficiency. The proposed method also provides secure data sharing and removes the burden of an exhaustive re-encryption computation. In the paper, two different keys are computed: one key for each legitimate user among a group and another key for the crypto-system, which is responsible to do all computations over the data. The method provides security against internal threats since only a single share of the key can be accessed. The efficiency of the model is measured by measuring the execution time for key formation, encryption, and decryption processes.