TY - JOUR T1 - Cryptographic Tree and Log File Based Secret Sharing Key Management Scheme for Securing Outsourced Data in Cloud AU - Ali, S. Ahamed AU - Ramakrishnan, M. JO - Asian Journal of Information Technology VL - 15 IS - 20 SP - 3973 EP - 3979 PY - 2016 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2016.3973.3979 UR - https://makhillpublications.co/view-article.php?doi=ajit.2016.3973.3979 KW - Cloud computing KW -data outsourcing KW -cryptographic tree KW -log file KW -master key KW -secret sharing AB - Cloud computing from the last few years has grown from a promising business concept to one of the fastest growing segments of IT Enterprise. This unique paradigm brings about many new security challenges. This research studies the problem of ensuring the storage security to the data outsourced in the cloud which is accessed and controlled by multiple legitimate parties. For this we propose a very practical approach of providing security to the data outsourced in the cloud environment based on both Cry ptographic Tree and Log File (CTLF).The Cryptographic tree and log file is used to authenticate a set a data items and preserve block level integrity to the outsourced data. This approach generates a master key for encryption and decryption using the primary key k which is provided by the cloud client and the secondary key k , the primary key k is p s p secret shared among “n” share holders nodes. This scheme is more reliable, decentralized light weight key management scheme which provides better security and performance than existing ones. This scheme also allows multiple legitimate parties to access the data outsourced in the cloud without making compromise on security. ER -