21,505 research outputs found

    A COMPREHENSIVE STUDY OF CRYPTOGRAPHY AND KEY MANAGEMENT BASED SECURITY IN CLOUD COMPUTING

    Get PDF
    Cloud computing is a cost effective flexible and proven delivery platform for providing consumer IT services or business services over internet. It has an ability to provide many services over internet. It not only provides computing services but additional computing resources. To interact with various services in the cloud and to store retrieve data from cloud several security mechanism is required. Cryptography and key management mechanism are one of the import services in the cloud to secure data. In this context, this paper investigates the basic problem of cloud computing with cryptography and key management system for enabling support of interoperability between cloud cryptography client and key management services

    Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique

    Full text link
    More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues. Presently the many of cloud computing systems endow digital identity for clients to access their services, this will bring some drawback for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing framework use asymmetric and traditional public key cryptography to give information security and common authentication. Identity-based cryptography has some attraction attributes that appear to fit well the necessities of cloud computing. In this paper, by receiving federated identity management together with hierarchical identity-based cryptography (HIBC) with cloud heritage technique, not only the key distribution but also the mutual validation can be rearranged in the cloud

    A Review on Progress and Problems of Quantum Computing as a Service (QCaaS) in the Perspective of Cloud Computing

    Get PDF
    Cloud computing is a global established system Quantum computing is hypothetical model which is still in tentative analysis Cloud system has some weakness in security processing backup and vicinity Somehow quantum computing illustrates some revolutionary solution to overcome cloud weakness Most researchers are optimistic in quantum computing that it will improve cloud system It is not easy to combine these two different systems along We will show two quantum approaches quantum cryptography and blind quantum computing to secure cloud computing Quantum cryptography will secure the user data transmission and communication through cloud form hackers And blind computing will secure the instant eavesdropping or accessing of data processing in cloud from any vicious cloud provider or third party This paper s major target is to show advantages and disadvantages of quantum computing in the viewpoint to integrate it with cloud system Also review some current improvement of quantum computing and compute

    Application of Elliptical Curve Cryptography in Empowering Cloud Data Security

    Get PDF
    Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography. The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give access to the encryption keys stored in cloud

    Cloud Data Security Using Elliptic Curve Cryptography

    Get PDF
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue in effective execution of Cloud Computing is to adequately deal with the security in the cloud applications. This paper talks about the part of cryptography in cloud computing to improve the data security. The expectation here is to get bits of knowledge another security approach with the usage of cryptography to secure information at cloud data centers

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view

    Framework to establish offline file sharing in Application as a service layer in cloud computing

    Get PDF
    Term cloud computing has opened entire new domain of computability, reliability and efficiency. Organizations can now focus on providing targeted services to consumers rather than considering infrastructure and resource issues. Cloud consumers can enjoy ease of computing and power of reliability but cloud service providers have to ensure many measures to let cloud services be reality and reliable. Consumers can store their valuable data on cloud and can use them as and when required. This leads to some key points like security of cloud data should be considered, sharing of cloud data as per requirement should be done. Allocation of required resources to the consumers should be done efficiently and above all, cloud service providers should have opportunity to gain some economical values. This research paper is based on providing some mechanism to allow file sharing among various cloud users. This paper proposed a framework that can be followed to easily share file residing on cloud with another cloud user. In this framework, concept of cryptography has been used to generate secure key that can be shared among users. Cryptography allows encryption and decryption of different normal text to some cipher text that cannot be interpreted easily. This paper has proposed secure mechanism of generating key, sharing a key and validating use of key for given file. Most important aspect considered in this research paper is, the user who owns a file and wants to provide access to other user don’t have internet access at hand. Framework uses mobile technology to contact service providers and generate a key as and when needed. Keywords— Cloud computing, cryptography, AES, RSA, Security, Authentication, Validation, Application as a servic
    • …
    corecore