ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Result Analysis on Secured Encryption in Cloud Computing using Symmetric Cryptography

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 680-688

Keywords : Cloud computing; security; privacy; trust; confidentiality; integrity; accountability; availability;

Source : Downloadexternal Find it from : Google Scholarexternal


The paper explains all the theoretical results related to privacy and security of cloud computing. We have implemented all these parameters in the form of basic cloud application and its deployment. Basically We have implemented attribute driven security model for cloud computing. Our application is able to resist the attacks from various fields over confidentiality, integrity, availability, accountability, and privacy-preservability. Because these are the most attacked parameters in cloud computing. Cloud computing provides innumerable benefits to its customers but it fails to solve information security concerns especially in public cloud. Symmetric Cryptographic Key is sensitive data and it is required to be stored at cloud platform to solve several problems of encrypted data such as searching/manipulation on encrypted data. This paper is presenting a technique that will manage symmetric cryptographic keys on cloud-based environment. The technique is based on secret splitting technique enhanced Shamir's algorithm. Proposed technique will implemented in Open Stack private cloud environment for performance analysis. We have identified five most representative security and privacy attributes (i.e., confidentiality, integrity, availability, accountability, and privacy-preservability). Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario. Future research directions are previously determined for each attribute.

Last modified: 2014-07-27 23:39:03