ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

THE POTENT WAY FOR SECURING DATA WITH SECRET KEY EXCHANGE OVER CLOUD COMPUTING

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.8, No. 6)

Publication Date:

Authors : ;

Page : 106-113

Keywords : Cloud Computing; Crypto graphical key; communication parties; AES; Diffie– Hellman; MIM attack.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configrable computing resources resources for users and enterprises with various computing capabilities to store and process data either in a privately-owned cloud, or on a third-party server located in a data center. When the cloud user stores their sensitive and confidential information in the cloud platform that should be in secured form . For this, it should be transmitted over a protected and secured medium. A practical way to overcome this, is by using AES with Dif ie-Hellman algorithm. It is used to exchange the cryptographical keys securely over the public channel. In this paper, the extended version of AES with Dif ie-Hellman algorithm is suggested which can prevent the system against Mim attack .It uses one model, based on arbitrary numbers and logarithms. This is considered to provide security improvement to the communication medium and also countermeasure the attack. Also, a cloud based model is presented for engineering educational domain. Above algorithm is used in this architecture to provide more security to the user data. This architecture attains various security parameters such as confidentiality, data integrity and individualization

Last modified: 2021-07-07 20:26:32