A Result Analysis on Secured Encryption in Cloud Computing using Symmetric Cryptography
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)Publication Date: 2014-07-30
Authors : Anand Darne; Rushikesh Longadge;
Page : 680-688
Keywords : Cloud computing; security; privacy; trust; confidentiality; integrity; accountability; availability;
Abstract
The paper explains all the theoretical results related to privacy and security of cloud computing. We have implemented all these parameters in the form of basic cloud application and its deployment. Basically We have implemented attribute driven security model for cloud computing. Our application is able to resist the attacks from various fields over confidentiality, integrity, availability, accountability, and privacy-preservability. Because these are the most attacked parameters in cloud computing. Cloud computing provides innumerable benefits to its customers but it fails to solve information security concerns especially in public cloud. Symmetric Cryptographic Key is sensitive data and it is required to be stored at cloud platform to solve several problems of encrypted data such as searching/manipulation on encrypted data. This paper is presenting a technique that will manage symmetric cryptographic keys on cloud-based environment. The technique is based on secret splitting technique enhanced Shamir's algorithm. Proposed technique will implemented in Open Stack private cloud environment for performance analysis. We have identified five most representative security and privacy attributes (i.e., confidentiality, integrity, availability, accountability, and privacy-preservability). Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario. Future research directions are previously determined for each attribute.
Other Latest Articles
- E-commerce: Recommended Online Payment Method - PayPal
- Usability Factors in Information Systems Development
- Polarity Classification on Twitter- You are “What you Tweet”
- SECURING PUBLIC HEALTH RECORDS IN CLOUD COMPUTING PATIENT CENTRIC AND FINE GRAINED DATA ACCESS CONTROL IN MULTI OWNER SETTINGS
- Natural Language Processing Interface for Synonym
Last modified: 2014-07-27 23:39:03