THE POTENT WAY FOR SECURING DATA WITH SECRET KEY EXCHANGE OVER CLOUD COMPUTING
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.8, No. 6)Publication Date: 2017-12-25
Authors : M Praveen Kumar;
Page : 106-113
Keywords : Cloud Computing; Crypto graphical key; communication parties; AES; Diffie– Hellman; MIM attack.;
Abstract
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configrable computing resources resources for users and enterprises with various computing capabilities to store and process data either in a privately-owned cloud, or on a third-party server located in a data center. When the cloud user stores their sensitive and confidential information in the cloud platform that should be in secured form . For this, it should be transmitted over a protected and secured medium. A practical way to overcome this, is by using AES with Dif ie-Hellman algorithm. It is used to exchange the cryptographical keys securely over the public channel. In this paper, the extended version of AES with Dif ie-Hellman algorithm is suggested which can prevent the system against Mim attack .It uses one model, based on arbitrary numbers and logarithms. This is considered to provide security improvement to the communication medium and also countermeasure the attack. Also, a cloud based model is presented for engineering educational domain. Above algorithm is used in this architecture to provide more security to the user data. This architecture attains various security parameters such as confidentiality, data integrity and individualization
Other Latest Articles
- STUDY ON EFFICIENT ALGORITHMS FOR MINING HIGH UTILITY ITEMSETS FROM TRANSACTIONAL DATABASES
- ACTIVITY RECOGNITION FROM VIDEO IN DAY OR NIGHT USING FUZZY CLUSTERING TECHNIQUES
- SURVEY ON: MININIZING THE MESSAGE DELAY BY USING SMARD GRID APPLICATION
- SURVEY OF CROWDSOURCING IN SOFTWARE ENGINEERING: MODELS, OPPORTUNITIES AND CHALLENGES
- USAGE OF FULLY CONVOLUTION NETWORK WITH CLUSTERING ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
Last modified: 2021-07-07 20:26:32