Implementation Of Multi-Security Algorithms In Cloud To Achieve Confidentiality And Apply Authentication
[Full Text]
AUTHOR(S)
Arpit Agrawal, Ankit Yadav
KEYWORDS
AES, BLOWFISH, Cloud Computing, ECC, Security, SLA, Resource Pooling
ABSTRACT
Cloud computing originates with many features to serve users with resources, services and wide storage for data. If any kind of data is stored then it requires security, so security of data becomes significant issue in cloud. Over the time, this issue needs to be resolved for the security purpose. Due to the sharing of distributed resources through an insecure network in an open environment, cloud faces security issues therefore easy access of data is possible from anywhere. Existing work employed security using symmetric algorithm AES, which suffers with the issue of stolen of key while transmission. Performance of existing work is also not satisfying and is achieved in proposed work by decreasing delay time. Presented work achieved authentication, confidentiality and integrity to maintain security and privacy.
REFERENCES
[1] Bih-Hwang Lee, Ervin Kusuma Dewi, “Data Security in Cloud Computing Using AES under HEROKU Cloudâ€. 27th Wireless and Optical Communications Conference, IEEE (WOCC2018), 2018.
[2] Information Security Briefing Cloud Computing, Vol.1, Center of The Protection of National Infrastructure CPNI by Deloitte, 2010, p. 71.
[3] L. Foster, Y. Zhao, I. Raicu, S.Y. Lu, Cloud computing and grid computing 360-degree compared, in: Grid Computing Environments Workshop, GCE’08, Austin, TX, Nov. 12-16, 2008, pp. 1-10.
[4] The NIST Definition of Cloud Computing, National Institute of Science and Technology, p.7. Retrieved July 24 2011.
[5] J.W. Rittinghouse, J.F. Ransome, Cloud Computing Implementation, Management, and Security, CRC Press, Boca Raton, 2009.
[6] Deyan Chen; Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol.1, no., pp.647-651, 23-25 March 2012.
[7] Vishwanath s Mahalle, Aniket K Shahade, “Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithmâ€, “Power, Automation and communication (INAP)â€, 2014.
[8] V. Chang, C.-S. Li, D. De Roure, G. Wills, R.J. Walters, and C. Chee, “The financial clouds reviewâ€, Cloud Computing Advancements in Design, Implementation, and Technologies, vol. 125, 2012.
[9] A. Lopez-Alt, E. Tromer, and V. Vaikuntanathan, “On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryptionâ€, in Proceedings of the forty-fourth annual ACM symposium on Theory of computing. ACM, 2012, pp. 1219-1234.
[10] M. Brenner, J. Wiebelitz, G. Von Voigt, and M. Smith, “Secret program execution in the cloud applying homomorphic encryptionâ€, in 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011). IEEE,2011, PP.114-119.
|