ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review Report on Secured Encryption in Cloud Computing using Symmetric Cryptography?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 5)

Publication Date:

Authors : ; ; ;

Page : 530-533

Keywords : Public Key Cryptographic Standard (PKCS7); Public Key Infrastructure (PKI); Cryptographic Key Management (CKM); National Institute of Standard & Technology (NIST); Secure Shell (SSH);

Source : Downloadexternal Find it from : Google Scholarexternal


The paper proposes all the theoretical results related to privacy and security of cloud computing. We are implementing all these parameters in the form of basic cloud application and its deployment. Basically We are implementing attribute driven security model for cloud computing. Our application will be able to resist the attacks from various fields over confidentiality, integrity, availability, accountability, and privacy-preservability. Because these are the most attacked parameters in cloud computing. Cloud computing provides innumerable benefits to its customers but it fails to solve information security concerns especially in public cloud. Symmetric Cryptographic Key is sensitive data and it is required to be stored at cloud platform to solve several problems of encrypted data such as searching/manipulation on encrypted data. This paper will present a technique that will manage symmetric cryptographic keys on cloud-based environment. Proposed technique is based on secret splitting technique enhanced Shamir's algorithm. Proposed technique will implemented in Open Stack private cloud environment for performance analysis.

Last modified: 2014-05-25 16:04:45