Distributed Key Management for IT Infrastructure using Block Chain and Hash Graph
Sathya Priya S1, Revathy S2, Kamnag R3, Yogeswar L4, Sajal M5, Suparna S6
1Sathya Priya, Associate Professor, Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Chennai (Tamil Nadu), India.
2S, Revathy S, Assistant Professor, Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Chennai (Tamil Nadu), India.
3Kamnag R, Department of Computer Science and Engineering, Hindustan Technology and Science, Chennai (Tamil Nadu), India.
4Yogeswar L, Department of Computer Science and Engineering, Hindustan Technology and Science, Chennai (Tamil Nadu), India.
5Sajal M, Department of Computer Science and Engineering, Hindustan Technology and Science, Chennai (Tamil Nadu), India.
6Suparna S, Department of Computer Science and Engineering, Hindustan Technology and Science, Chennai (Tamil Nadu), India.
Manuscript received on 19 July 2019 | Revised Manuscript received on 03 August 2019 | Manuscript Published on 10 August 2019 | PP: 533-537 | Volume-8 Issue-2S3 July 2019 | Retrieval Number: B10960782S319/2019©BEIESP | DOI: 10.35940/ijrte.B1096.0782S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The Cloud Computing Paradigm simplified the IT infrastructure management thereby making the organiza-tions and enterprises to rapidly migrate from conventional model to service driven model. The service driven model allows the users to access, maintain and backup the files from remote location over the internet through the central-ized cloud service providers. Inspite of major advantages, there are some concerns for the safety and privacy risks of organizational and users sensitive information in cloud stor-age. The existing service oriented model uses distributed key management which encrypts the data and stores it in cloud servers to provide the authentication to data, but it addresses challenges in identifying ownership of data, boot-strapping problem and securing the keys. The proposed system uses block chain, a distributed ledger for user authentication in cloud server and Hash graph with asynchronous byzantine fault tolerance algorithm is proposed for replicat-ed state machines with guaranteed Byzantine fault-tolerance and it can be utilized in the IT Infrastructure envi-ronment which solves the hassles of maintaining security keys.
Keywords: Block Chain, Cloud Environment, Distributed Key Management, Hash-Graph, Security.
Scope of the Article: Block Chain-Enabled IoT Device and Data Security and Privacy