Protection Framework for Receiving of Information Using Digital Signature Algorithm

Authors(2) :-D. Chand Basha, G. Sivaranjani

Distributed computing is getting more conspicuous in the field of programming designing in perspective of its unflinching quality in securing and assessing data remotely. In the proximity circumstance it is amazingly biter to have mobile phones as an interface among customer and server, to access and store data for one's need. Adaptable advancement in cloud handling is urges customers to take a shot at the data for any of the application for their relationship in adaptability. In these perspectives flexible circulated processing is our present topic of energy as it is critical to secure the data away and access since the transportation of the data is through for the most part by open framework. In this wander the flexible cloud condition is used for securing and assessing data and thusly it is required a viable cloud mastermind that is a framework for correspondence besides, data approval. For confirmation it is fundamental to diagram a security framework for compact cloud condition that ensures better check of data in the mobile phones and in the limit contraptions. We propose another security structure for tolerating of data using propelled stamp.

Authors and Affiliations

D. Chand Basha
Student, Dept of Master of Computer Applications, Rayalaseema Institute of Information and Management Sciences, Tirupati, India)
G. Sivaranjani
Assistant Professor, Dept of Master of Computer Applications, Rayalaseema Institute of Information and Management Sciences, Tirupati, India)

Distributed computing, Security, Digital Signature Algorithm, Cloud Service Provider, Hash

  1. Lysyanskaya, A. R. Tamassia and N. Triandopoulos, 2004. Multicast Authentication in Fully Adversarial Networks, Proc. IEEE Symp. Security and Privacy (SP ’04), pp: 241-253.
  2. Miner, S. and J. Staddon, 2001. Graph-Based Authentication of Digital Streams’, Proc. IEEE Symp. Security and Privacy (SP ’01), pp: 232-246.
  3. Udayakumar, R., V. Khanna, T. Saravanan and G. Saritha, 2013. Retinal Image Analysis Using Curvelet Transform and Multistructure Elements Morphology by Reconstruction, Middle-East Journal of Scientific Research, ISSN: 1990-9233, 16(12): 1798-1800.
  4. Sibghatullah Nasir, 2013. Microfinance in India Contemporary Issues and Challenges. Middle-East Journal of Scientific Research, 15(2): 191-199.
  5. Mueen Uddin, Asadullah Shah, Raed Alsaqour and Jamshed Memon, 2013. Measuring Efficiency of Tier Level Data Centers to Implement Green Energy Efficient Data Centers, Middle-East Journal of Scientific Research, 15(2): 200-207.
  6. Hossein Berenjeian Tabrizi, Ali Abbasi and Hajar Jahadian Sarvestani, 2013. Comparing the Static and Dynamic Balances and Their Relationship with the Anthropometrical Characteristics in the Athletes of Selected Sports, Middle-East Journal of Scientific Research, 15(2): 216-221.
  7. Anatoliy Viktorovich Molodchik, 2013.
  8. Meruert Kylyshbaevna Bissenova and Ermek Leadership Development. A Case of a Russian Talantuly Nurmaganbet. The Notion of Guilt and Business School, Middle-East Journal of Scientific Problems of Legislative Regulations of its Forms. Research, 15(2): 222-228. The Notion of Guilt in the Criminal Law of Kazakstan, Middle-East Journal of Scientific Research, 15(2): 229-236.
  9. Somani, Uma, Kanika Lakhani, and Manish Mundra. "Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing." Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on. IEEE, 2010. [10] Hashizume, Keiko, et al. "An analysis of security issues for cloud computing." Journal of Internet Services and Applications 4.1 (2013): 1-13.
  10. Rani, Sunita, and Ambrish Gangal. "Cloud security with encryption using hybrid algorithm and secured endpoints." International journal of computer science and information technologies 3.3 (2012): 4302- 4304.
  11. Saravanan, N., et al. "An implementation of RSA algorithm in google cloud using cloud SQL." Research Journal of Applied Sciences, Engineering and Technology 4.19 (2012): 3574-3579.
  12. Kumar, K. Vijay, Dr N. Chandra Sekhar Reddy, and B. Srinivas Reddy. "Preserving Data Privacy, Security Models and Cryptographic Algorithms in Cloud Computing." International Journal of Computer Engineering and Applications 7.1 (2015).
  13. V. Vinaya, and P. Sumathi, “Implementation of Effective Third Party Auditing for Data Security in Cloud”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, pp. 382-387, May 2013.s
  14. C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services” IEEE Network, vol. 24, no.4, pp. 19-24, 2010.
  15. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing”, IEEE INFOCOM, pp. 1-9, March 2010.
  16. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing”. IEEE Transactions on Services Computing, vol.5, no.2, pp.220-232, 2012.
  17. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
  18. K. Yang, and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, IEEE Transactions on Parallel & Distributed Systems, vol. 24, no. 9, pp. 1717-1726, 2012.
  19. Y. Zhu, H. Hu, G.-J. Ahn, and S. S. Yau, “Efficient audit service outsourcing for data integrity in clouds,” In Journal of Systems and Software, vol. 85, no. 5, pp. 1083-1095, May 2012.

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 523-527
Manuscript Number : CSEIT184192
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

D. Chand Basha, G. Sivaranjani, "Protection Framework for Receiving of Information Using Digital Signature Algorithm", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.523-527, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT184192

Follow Us

Contact Us