Details



CLOUD COMPUTING : LEVERAGING CRYPTOGRAPHY TO DEVELOP THE EFFICACY OF AN ADAPTABLE AND SEALABLE MODEL

Divyansh Gupta, Ujjwal Jain

34-40

Vol 7, Jan-Jun, 2018

Date of Submission: 2018-01-11 Date of Acceptance: 2018-02-27 Date of Publication: 2018-03-01

Abstract

Distributed computing is a savvy, adaptable and adaptable model of giving system administrations to a scope of clients including individual and business over the Internet. It has acquired the insurgency the time of conventional technique for putting away and sharing of assets. It gives an assortment of advantages to its clients, for example, compelling and effective utilization of powerfully dispensed shared assets, financial matters of scale, accessibility of assets and so forth. On the other part, distributed computing presents level of security dangers since basic administrations are regularly controlled and taken care of by outsider which makes it hard to keep up information security and protection and bolster information and administration accessibility. Since the cloud is an accumulation of machines called servers and every one of clients' information put away on these machines, it raises the security issues of privacy, respectability, and accessibility. Verification and approval for information access on cloud is in excess of a need. Our work endeavors to defeat these security challenges. The proposed technique gives more control of proprietor on the information put away on cloud by confining the entrance to particular client for particular record with constrained benefits and for restricted day and age based on mystery key utilizing symmetric and in addition unbalanced component. The honesty and privacy of information is guaranteed doubly by scrambling the mystery key as well as to the entrance consent and restricted record data.

References

  1. K. Chachapara and S. Bhadlawala, “Secure sharing with cryptography in cloud computing” proceeding of International Conference on engineering, 2013
  2. A. N. Jaber and Md. F. B. Zolkipli, “Use of cryptography in cloud computing” IEEE International conference on Control System, Computing and Engineering, Malaysia, 2013, pp. 179-184
  3. Saddat Malik, “Network security principles and practices”, CCIE No. 4955, pp-470-475 ISBN: 1-58705-025-0, Cisco Press, Available at A469&dq=security+features+AAA&source=bl&ots=W2Tq2B_ dlM&sig=62wxhzgRKpM1ky1d1xJF4IoEbrg&hl=en&sa=X&ei=Bh LDVKZfioDyBZecgbAL&ved=0CFQQ6AEwCQ#v=onepage&q=security%20features%20AA A&f=false
  4. S. M. Metev and V.P. Veiko, “Laser Assisted Microtechnology”, 2nd ed., R. M. Osgood, Jr., Ed. Berlin, Germany; Springer-Verlag, 1998
  5. S. Sanyal, and P. P Iyer, “Cloud Computing – An Approach with Modern Cryptography,” arXiv preprint arXiv:1303.1408, 2013
  6. K. Rauber, “Cloud Cryptography”, International Journal of Pure and Applied Mathematics, vol.85, no.1, pp.1-11, 2013
  7. V. Ustimenko, and A. Wrobewska, “On some algebraic aspects of data security in cloud computing”, Proceedings of Applications of Computer Algebra ACA 2013. Malaga, pp.155, 2013
  8. S. Bleikertz, S. Bugiel, H. Ideler, S. Nurnberger, and A. R. Sadeghi, “Client-controlled Cryptography-as-a-Service in the Cloud”
  9. S. Bleikertz, S. Bugiel, H. Ideler, S. Nurnberger, and A. R. Sadeghi, “Client-controlled Cryptography-as-a-Service in the Cloud”
  10. J. Meltzer, “What is cloud computing?”, Available at http://www.quora.com/What-is-cloud-computing-2
Download PDF
Back