Optimized Security Mechanism for publicly Secret Key Sharing over Cloud using Blockchain
DOI:
https://doi.org/10.2583/Keywords:
Blockchain, Critical Recovery, Information Security, Cloud ComputingAbstract
A publicly verifiable key sharing mechanism based on threshold key sharing is provided to explore the security of users' private keys on the blockchain. Participating nodes check the key fragment after receiving it, effectively preventing it from being abused. The crucial sections of the nodes that participated in the critical splicing are made public during the critical recovery stage to prevent them from performing harmful things during the critical recovery stage. Add IDs to the nodes that participated in the crucial splicing during the key distribution stage; a dynamic threshold system is intended to track and update the status of malicious nodes in real time. When the node that possesses the crucial component fails, the owner of the critical component and the main node relocate a key element to the new participating nodes to safeguard sensitive information. The experimental results show that this system has a key recovery rate of 80% and threshold qualities such as traceability, enforceability, and recoverability.
Keywords: Blockchain, Critical Recovery, Information Security, Cloud Computing
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
JESM Journal operates under the Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). This allows others distribute, remix, tweak, and build upon the work, even commercially, as long as they credit the authors for the original creation. All authors publishing in JESM Journal accept these as the terms of publication.