To Augment Protection of data in Cloud Computing using Digital Signature

Authors

  • Ms. B. Kauser Banu  Research Scholar, Dept. of Computer Science, Shanmuga Industries Arts and Science College, Thiruvannamalai, Tamil Nadu, India
  • Mr. V. Sakthivel  Research Supervisor, HOD, Dept. of Computer Application, Shanmuga Industries Arts and Science College, Thiruvannamalai, Tamil Nadu, India

Keywords:

Cloud Computing, AES Algorithm, Data Confidentiality

Abstract

Cloud computing is an information technology for thedecade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. Since cloud computing is rest on internet, security issues like privacy, protection of data, confidentiality, and authentication is encountered. In order to get rid of the same, a variety of encryption algorithms and mechanisms are used. Many researchers choose the best they found and use it in different combination to provide security to the data in cloud. On the similar terms, we have chosen to make use of a combination of authentication technique and key exchange algorithm blended with an encryption algorithm. This combination is referred to as “Three way mechanism” because it ensures all the three-protection scheme of authentication, protection of data and verification, at the same time. In this paper, we have proposed to make use of digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption Standard encryption algorithm to protect confidentiality of data stored in cloud. Even if the key in transmission is hacked, the facility of Diffie Hellman key exchange render it useless, since key in transit is of no use without user’s private key, which is confined only to the legitimate user. This proposed architecture of three-way mechanism makes it tough for hackers to crack the security system, thereby protecting data stored in cloud.

References

  1. Yoichiro Ueno, NoriharuMiyaho, Shuichi Suzuki,MuzaiGakuendai, Inzai-shi, Chiba,Kazuo Ichihara, 2010, “Performance Evaluation of a Disaster Recovery System and Practical Network System Applications,” Fifth International Conference on Systems and Networks Communications,pp 256-259.
  2. Chi-won Song, Sungmin Park, Dong-wook Kim, Sooyong Kang, 2011, “Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service,” International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11.
  3. Y.Ueno, N.Miyaho, and S.Suzuki, 2009, “Disaster Recovery Mechanism using Widely Distributed Networking and Secure Metadata Handling Technology”, Proceedings of the 4th edition of the UPGRADE-CN workshop, pp. 45-48.
  4. Giuseppe Pirr´o, Paolo Trunfio, Domenico Talia, Paolo Missier and Carole Goble, 2010, “ERGOT: A Semantic-based System for Service Discovery in Distributed Infrastructures,” 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
  5. VijaykumarJavaraiah Brocade Advanced Networks and Telecommunication Systems (ANTS), 2011, “Backup for Cloud and Disaster Recovery for Consumers and SMBs,” IEEE 5th International Conference, 2011.
  6. Lili Sun, Jianwei An, Yang Yang, Ming Zeng, 2011, “Recovery Strategies for Service Composition in Dynamic Network,” International Conference on Cloud and Service Computing
  7. Xi Zhou, Junshuai Shi, YingxiaoXu, Yinsheng Li and Weiwei Sun, 2008, "A backup restoration algorithm of service composition in MANETs," Communication Technology ICCT 11th IEEE International Conference, pp. 588-591.
  8. M. Armbrust et al, “Above the clouds: A berkeley view of cloud computing,”http://www.eecs.berkeley.edu/Pubs/TechRpts/2009//EEC S-2009-28.pdf.
  9. F.BKashani, C.Chen,C.Shahabi.WSPDS, 2004, “Web Services Peerto Peer Discovery Service ,” ICOMP.
  10. EleniPalkopoulouy, Dominic A. Schupke, Thomas Bauscherty, 2011, “Recovery Time Analysis for the Shared Backup Router Resources (SBRR) Architecture”, IEEE ICC.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
Ms. B. Kauser Banu, Mr. V. Sakthivel, " To Augment Protection of data in Cloud Computing using Digital Signature, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 3, pp.153-157, January-February-2018.